Share Email Print

Proceedings Paper

Tailoring PKI for the battlespace
Author(s): Carlin R. Covey
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

A Public Key Infrastructure (PKI) can provide useful communication protections for friendly forces in the battlespace. The PKI would be used in conjunction with communication facilities that are accorded physical and Type-1 cryptographic protections. The latter protections would safeguard the confidentiality and (optionally) the integrity of communications between enclaves of users, whereas the PKI protections would furnish identification, authentication, authorization and privacy services for individual users. However, Commercial-Off-the-Shelf (COTS) and most Government-Off-the-Shelf (GOTS) PKI solutions are not ideally tailored for the battlespace environment. Most PKI solutions assume a relatively static, high-bandwidth communication network, whereas communication links in the battlespace will be dynamically reconfigured and bandwidth-limited. Most enterprise-wide PKI systems assume that users will enroll and disenroll at an orderly pace, whereas the battlespace PKI “enterprise” will grow and shrink abruptly as units are deployed or withdrawn from the battlespace. COTS and GOTS PKIs are seldom required to incorporate temporary "enterprise mergers", whereas the battlespace “enterprise” will need to incorporate temporary coalitions of forces drawn from various nations. This paper addresses both well-known and novel techniques for tailoring PKI for the battlespace environment. These techniques include the design of the security architecture, the selection of appropriate options within PKI standards, and some new PKI protocols that offer significant advantages in the battlespace.

Paper Details

Date Published: 22 July 2003
PDF: 12 pages
Proc. SPIE 5101, Battlespace Digitization and Network-Centric Systems III, (22 July 2003); doi: 10.1117/12.487380
Show Author Affiliations
Carlin R. Covey, General Dynamics Decision Systems (United States)

Published in SPIE Proceedings Vol. 5101:
Battlespace Digitization and Network-Centric Systems III
Raja Suresh, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?