Security Infrastructures: Towards the INDECT System Security

  • Nikolai Stoianov
  • Manuel Urueña
  • Marcin Niemiec
  • Petr Machník
  • Gema Maestro
Part of the Communications in Computer and Information Science book series (CCIS, volume 287)


This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI, the different technologies employed in the VPN testbed, the INDECT Block Cipher (IBC) – a new cryptography algorithm that is being integrated in OpenSSL/OpenVPN libraries, and how TLS/SSL and X.509 certificates stored in smart-cards are employed to protect INDECT applications and to implement the access control of the INDECT Portal. All the proposed mechanisms have been designed to work together as the security foundation of all systems being developed by the INDECT project.


Public Key Infrastructure (PKI) Virtual Private Network (VPN) symmetric block ciphers application security smartcard certificates access control Transport Layer Security (TLS) 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    INDECT Consortium. D8.1: Specification of Requirements for Security and Confidentiality of the System,
  2. 2.
    INDECT Consortium. D8.3: Specification of new constructed block cipher and evaluation of its vulnerability to errors (December 2010),
  3. 3.
    INDECT Consortium. D9.13: New block ciphers (December 2010),
  4. 4.
    INDECT project web site,
  5. 5.
    Hickman, K.: The SSL Protocol. Netscape Communications Corp. (February 1995)Google Scholar
  6. 6.
    Thomas, S.A.: SSL and TLS Essentials: Securing the Web. Wiley Computer Publishing (2000)Google Scholar
  7. 7.
    Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2, RFC 5246 (August 2008)Google Scholar
  8. 8.
    Zhelyazkov D., Stoianov, N.: PKI Infrastructure in the BA – Prerequisite for Minimization of the Risk and Enhancement of the Information Security, CIO, Special issue Communication & Information Technologies for the Defense, pp. 19-20 (September 2009) ISSN 13112-5605 Google Scholar
  9. 9.
  10. 10.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Nikolai Stoianov
    • 1
  • Manuel Urueña
    • 2
  • Marcin Niemiec
    • 3
  • Petr Machník
    • 4
  • Gema Maestro
    • 5
  1. 1.INDECT Project TeamTechnical University of SofiaSofiaBulgaria
  2. 2.Department of Telematic EngineeringUniversidad Carlos III de MadridLeganés (Madrid)Spain
  3. 3.Department of TelecommunicationsAGH University of Science and TechnologyKrakowPoland
  4. 4.Department of TelecommunicationsVSB-Technical University of OstravaOstravaCzech Republic
  5. 5.APIF Moviquity SAMadridSpain

Personalised recommendations