Next-Generation Public-Key Infrastructures

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (15 June 2019) | Viewed by 6090

Special Issue Editor


E-Mail Website
Guest Editor
Politecnico di Torino, Dip. Automatica e Informatica, 10129 Torino, Italy
Interests: trusted computing; policy-based security management; electronic identity; public key Infrastructure; network security

Special Issue Information

Dear Colleagues,

Public-Key Infrastructures and digital certificates were initially associated with secure e-mail and digital documents, but they have now found their space in many areas of IT security, from networks to applications. However, the IoT landscape is changing quickly with the appearance of several new paradigms that might benefit from the application of PKI if twisted in a proper format or customized to respect specific constraints. As an example, consider Internet-of-Things (IoT) where authentication and integrity are primary concerns but there is a lack of computational power to adopt a standard PKI. Highly distributed architectures (such as those of smart cities, automotive applications, or personal smart devices) pose problems to PKI as the attacker may have physical access to the devices and hence directly threaten the keys or the trusted roots. Cloud computing, even when managed according to security standards, is another environment where keys and certificates must be properly managed to avoid weaknesses and permit proper forensic analysis in case of incidents.

This Special Issue calls for advanced applications of PKI to modern innovative environments, as well as advances in PKI foundations.

The list of possible topics includes, but is not limited to:

  • Innovative PKI applications for the protection of modern environments (e.g. IoT, smart-x, automotive, cloud computing, softwarized networks)
  • Innovative PKI architectures and protocols for traditional or next-generation IT environments
  • Solutions to the key-management and/or root-of-trust problems in constrained or untrusted environments

Prof. Antonio Lioy
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Public-key certificates
  • Key revocation
  • Private key protection
  • Certificate validation
  • Root of trust
  • PKI applications

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

25 pages, 3444 KiB  
Article
CKMI: Comprehensive Key Management Infrastructure Design for Industrial Automation and Control Systems
by Pramod T. C., Thejas G. S., S. S. Iyengar and N. R. Sunitha
Future Internet 2019, 11(6), 126; https://doi.org/10.3390/fi11060126 - 4 Jun 2019
Cited by 9 | Viewed by 5538
Abstract
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches. Many security breaches have been reported impacting society severely. Hence, it is essential to [...] Read more.
Industrial Automation and Control Systems (IACS) are broadly utilized in critical infrastructures for monitoring and controlling the industrial processes remotely. The real-time transmissions in such systems provoke security breaches. Many security breaches have been reported impacting society severely. Hence, it is essential to achieve secure communication between the devices for creating a secure environment. For this to be effective, the keys used for secure communication must be protected against unauthorized disclosure, misuse, alteration or loss, which can be taken care of by a Key Management Infrastructure. In this paper, by considering the generic industrial automation network, a comprehensive key management infrastructure (CKMI) is designed for IACS. To design such an infrastructure, the proposed scheme employs ECDH, matrix method, and polynomial crypto mechanisms. The proposed design handles all the standard key management operations, viz. key generation, device registration, key establishment, key storage, device addition, key revocation, key update, key recovery, key archival, and key de-registration and destruction. The design supports secure communication between the same and different levels of IACS devices. The proposed design can be applied for major industrial automation networks to handle the key management operations. The performance analysis and implementation results highlight the benefits of the proposed design. Full article
(This article belongs to the Special Issue Next-Generation Public-Key Infrastructures)
Show Figures

Figure 1

Back to TopTop