Geographic server distribution model for key revocation

被引:6
|
作者
Misra, Sudip [2 ]
Goswami, Sumit [3 ]
Pathak, Gyan Prakash [3 ]
Shah, Nirav [3 ]
Woungang, Isaac [1 ]
机构
[1] Ryerson Univ, Dept Comp Sci, Toronto, ON M5B 2K3, Canada
[2] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[3] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
Geographic server distribution; Key revocation; Public key infrastructure; Certifying authority; Strongest availability zone; CERTIFICATE REVOCATION; ENCRYPTION;
D O I
10.1007/s11235-009-9254-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Key management is one of the important issues in ensuring the security of network services. The aim of key management is to ensure availability of the keys at both the receiver's and the sender's ends. Key management involves two aspects: key distribution and key revocation. Key distribution involves the distribution of keys to various nodes with secrecy to provide authenticity and privacy. Key revocation involves securely and efficiently managing the information about the keys which have been compromised. This paper presents the geographic server distributed model for key revocation which concerns about the security and performance of the system. The concept presented in this paper is more reliable, faster and scalable than the existing Public Key Infrastructure (PKI) framework in various countries, as it provides optimization of key authentication in a network. It proposes auto-seeking of a geographically distributed certifying authority's key revocation server, which holds the revocation lists by the client, based on the best service availability. The network is divided itself into the strongest availability zones (SAZ), which automatically allows the new receiver to update the address of the authentication server and replace the old address with the new address of the SAZ, in case it moves to another location in the zone, or in case the server becomes unavailable in the same zone. In this way, it reduces the time to gain information about the revocation list and ensures availability and, thus, improvement of the system as a whole. Hence, the proposed system results in scalable, reliable and faster PKI infrastructure and will be attractive for the users who frequently change their location in the network. Our scheme eases out the revocation mechanism and enables key revocation in the legacy systems. It discusses the architecture as well as the performance of our scheme as compared to the existing scheme. However, our scheme does not call for the entire change in PKI, but is compatible with the existing scheme. Our simulations show that the proposed scheme is better for key revocation.
引用
收藏
页码:281 / 295
页数:15
相关论文
共 50 条
  • [21] Key PIT-distribution Scheme with Node Revocation for Wireless Sensor Networks
    Yan, Junzhi
    Ma, Jianfeng
    Li, Fenghua
    Moon, SangJae
    AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10 (2-3) : 235 - 251
  • [22] Improved self-healing key distribution with revocation in wireless sensor network
    Dutta, Ratna
    Mukhopadhyay, Sourav
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 2965 - +
  • [23] Dynamic key management with individual key revocation for TPM
    Yu F.
    Chen Y.
    Zhang H.
    1600, Tsinghua University (60): : 464 - 473
  • [24] Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks
    Bao, Kehua
    Zhang, Zhenfeng
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 221 - 233
  • [25] Self-healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks
    Yuan, Ting
    Ma, Jianqing
    Zhong, Yiping
    Zhang, Shiyong
    2008 INTERNATIONAL MULTISYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS), 2008, : 83 - 90
  • [26] Constant storage self-healing key distribution with revocation in wireless sensor network
    Dutta, Ratna
    Wu, Yong Dong
    Mukhopadhyay, Sourav
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1323 - +
  • [27] Anti-collusive self-healing key distribution scheme with revocation capability
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin, 150001, China
    Inf. Technol. J., 2009, 4 (619-624): : 619 - 624
  • [28] Secret key revocation in sensor networks
    Maeng, YoungJae
    Mohaisen, Abedelaziz
    Nyang, DaeHun
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2007, 4611 : 1222 - +
  • [29] Key Revocation Based on Dirichlet Multinomial Model for Mobile Ad Hoc Networks
    Fan, Xinxin
    Gong, Guang
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 933 - 940
  • [30] Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains
    Dutta, Ratna
    Chang, Ee-Chien
    Mukhopadhyay, Sourav
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 385 - +