Skip to main content

Security Infrastructures: Towards the INDECT System Security

  • Conference paper
Multimedia Communications, Services and Security (MCSS 2012)

Abstract

This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI, the different technologies employed in the VPN testbed, the INDECT Block Cipher (IBC) – a new cryptography algorithm that is being integrated in OpenSSL/OpenVPN libraries, and how TLS/SSL and X.509 certificates stored in smart-cards are employed to protect INDECT applications and to implement the access control of the INDECT Portal. All the proposed mechanisms have been designed to work together as the security foundation of all systems being developed by the INDECT project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. INDECT Consortium. D8.1: Specification of Requirements for Security and Confidentiality of the System, http://www.indect-project.eu/files/deliverables/public/INDECT_Deliverable_D8.1_v20091223.pdf/view

  2. INDECT Consortium. D8.3: Specification of new constructed block cipher and evaluation of its vulnerability to errors (December 2010), http://www.indect-project.eu/files/deliverables/public/deliverable-8.3

  3. INDECT Consortium. D9.13: New block ciphers (December 2010), http://www.indect-project.eu/files/deliverables/public/deliverable-9.13

  4. INDECT project web site, http://www.indect-project.eu

  5. Hickman, K.: The SSL Protocol. Netscape Communications Corp. (February 1995)

    Google Scholar 

  6. Thomas, S.A.: SSL and TLS Essentials: Securing the Web. Wiley Computer Publishing (2000)

    Google Scholar 

  7. Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246 (August 2008)

    Google Scholar 

  8. Zhelyazkov D., Stoianov, N.: PKI Infrastructure in the BA – Prerequisite for Minimization of the Risk and Enhancement of the Information Security, CIO, Special issue Communication & Information Technologies for the Defense, pp. 19-20 (September 2009) ISSN 13112-5605

    Google Scholar 

  9. http://www.ejbca.org/

  10. http://www.openca.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stoianov, N., Urueña, M., Niemiec, M., Machník, P., Maestro, G. (2012). Security Infrastructures: Towards the INDECT System Security. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2012. Communications in Computer and Information Science, vol 287. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30721-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30721-8_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30720-1

  • Online ISBN: 978-3-642-30721-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics