Optimization of a Public Key Infrastructure

被引:0
|
作者
Fongen, Anders [1 ]
机构
[1] Norwegian Def Res Estab, Kjeller, Norway
关键词
Public Key Cryptography; Scalability; Optimization;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The traffic patterns related to operation of a Public Key Infrastructure (PKI) can be modeled and optimized. Even though PKI has been around for three decades, relatively few results have been presented on this matter. The contribution of this paper is a PKI traffic model based on observation of familiar use cases together with hypotheses from scale free graph theory. Based on a set of estimated parameters, an optimized organization of a PKI is proposed. One key element has been to avoid costly revocation mechanisms. The proposed solution includes the use of short lived certificates which do not need a revocation mechanism, and the use of cached validation proofs to save protocol round trips. PKI also presents special challenges during operation in tactical wireless networks. Reduced bandwidth and connectivity requirements are commonly considered as essential properties for a successful tactical application. The paper also proposes an organization of a PKI for a mixed tactical/strategic network.
引用
收藏
页码:1440 / 1447
页数:8
相关论文
共 50 条
  • [21] An Internet Key Exchange Protocol Based on Public Key Infrastructure
    朱建明
    马建峰
    Advances in Manufacturing, 2004, (01) : 51 - 56
  • [22] The global public key infrastructure: Terms and concepts
    Csinger, A
    Siau, K
    COMPUTER, 1998, 31 (09) : 30 - 31
  • [23] An Implementation Suite for a Hybrid Public Key Infrastructure
    Chia, Jason
    Heng, Swee-Huay
    Chin, Ji-Jian
    Tan, Syh-Yuan
    Yau, Wei-Chuen
    SYMMETRY-BASEL, 2021, 13 (08):
  • [24] TOWARD A NATIONAL PUBLIC-KEY INFRASTRUCTURE
    CHOKHANI, S
    IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) : 70 - 74
  • [25] PKIoT: A public key infrastructure for the Internet of Things
    Marino, Francesco
    Moiso, Corrado
    Petracca, Matteo
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (10):
  • [26] Study of management on the mobile public key infrastructure
    Kawamoto, K
    Nakamura, N
    NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD, 2002, : 955 - 957
  • [27] Public key infrastructure: a micro and macro analysis
    Lancaster, S
    Yen, DC
    Huang, SM
    COMPUTER STANDARDS & INTERFACES, 2003, 25 (05) : 437 - 446
  • [28] Assessment of a public key infrastructure: Methodology and issues
    Stout, Glenn A.
    Computer Security Journal, 2002, 18 (3-4): : 15 - 21
  • [29] TOC approach to recertification in public key infrastructure
    Mukkamala, R
    Halappanavar, M
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: COMPUTER SCIENCE II, 2002, : 449 - 454
  • [30] Public Key Infrastructure for e-Assessment
    Katzlinger, Elisabeth
    Hoeller, Johann
    STATE-OF-THE-ART AND FUTURE DIRECTIONS OF SMART LEARNING, 2016, : 287 - 291