Open Access Open Access  Restricted Access Subscription or Fee Access

Certificate Revocation List Distribution Based on Road Map Distance Protocol (RMDP) in Vanet


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v10i3.5575

Abstract


Vehicular ad-hoc networking can provide efficient traffic information, emergency warning, alert messages and infotainment dissemination. It takes a vital role in safety fields such as defense system, traffic system, etc. Even though, some advanced Public Key Infrastructure and digital signature method was used for security, intrusion detection is an inevitable challenge in networks. Prevention and detection of malicious vehicle from jeopardizing the safety of the other vehicle is focused in this paper by using region-based FBB (Flooding-Bilinear-Bloom Filter) authentication protocol. Authentication is performed in any PKI (Public Key Infrastructure) system by checking if the certificate of the sender is included in the CRL (Certificate Revocation List) and verifying the authenticity and checking the sign of the sender. Bilinear pairing method is used to create an anonymous Id for each vehicle. The CRL checking process has been done using Bloom Filter method which avoids false negative. CRL can be passed between vehicles by bi-directional flooding method which avoids network congestion. This paper focuses mainly the CRL dissemination using the bi-directional flooding method. It replaces the time-consuming CRL Checking process. It reduces message loss ratio by using fast revocation checking and CRL updating method as well as it needs very less memory space compared to other methods.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


Certificate Revocation List; Roadmap Distance Protocol; Secret Key; Security; Vanet

Full Text:

PDF


References


Albert Wasef and Xuemin (Sherman) Shen, EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks, IEEE on Mobile Computing, Vol. 12, No. 1, January 2013.
http://dx.doi.org/10.1109/tmc.2011.246

Ghassan Samara, Wafaa A.H. Al-Salihy, R.Sures, Efficient Certificate Management in VANET, IEEE, 2010.
http://dx.doi.org/10.1109/icfcc.2010.5497419

Julien Freudiger, Maxim Raya, Mark Felegyhazi, Panos Papadimitratos and Jean-Pierre Hubaux, Mix-Zones for Location Privacy in Vehicular Networks, WiN-ITS 2007 Vancouver, British Columbia, Canada

M. Raya and J.-P. Hubaux, Securing Vehicular Ad Hoc Networks J. Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
http://dx.doi.org/10.1145/1080754.1080774

Haas, J.J., Yih-Chun Hu , Laberteaux, K.P , Efficient Certificate Revocation List Organization and Distribution, vol. 29, 2011.
http://dx.doi.org/10.1109/jsac.2011.110309

Samara, G, Al-Salihy, W.A.H, Sures, R, Efficient certificate management in VANET, Future Computer and Communication (ICFCC), V3-750 - V3-754, IEEE, 2010
http://dx.doi.org/10.1109/icfcc.2010.5497419

K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, CARAVAN: Providing Location Privacy for VANET, Proc. Embedded Security in Cars (ESCAR) Conf., Nov. 2005.

J.J. Haas, Y. Hu, and K.P. Laberteaux, Design and Analysis of a Lightweight Certificate Revocation Mechanism for VANET, Proc. Sixth ACM Int’l Workshop VehiculAr InterNETworking, pp. 89-98, 2009.
http://dx.doi.org/10.1145/1614269.1614285

Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, An Efficient Pseudonymous Authentication Scheme with Strong Privacy Preservation for Vehicular Communications, IEEE Trans. Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, Sept. 2010.
http://dx.doi.org/10.1109/tvt.2010.2051468

R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs, IEEE Trans. Vehicular Technology, vol. 61, no. 1, pp. 86-96, Jan. 2012.
http://dx.doi.org/10.1109/tvt.2011.2162864

A. Wasef and X. Shen, MAAC: Message Authentication Acceleration Protocol for Vehicular Ad Hoc Networks, Proc. IEEE GlobeCom, 2009.
http://dx.doi.org/10.1109/glocom.2009.5425220

J.P. Hubaux, The Security and Privacy of Smart Vehicles, IEEE Security and Privacy, vol. 2, no. 3, pp. 49-55, May/June 2004.
http://dx.doi.org/10.1109/msp.2004.26

M. Raya and J.-P. Hubaux, Securing Vehicular Ad Hoc Networks, J. Computer Security, vol. 15, no. 1, pp. 39-68, 2007.

M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, Eviction of Misbehaving and Faulty Nodes in Vehicular Networks, IEEE J. Selected Areas in Comm., vol. 25, no. 8, pp. 1557-1568, Oct. 2007.
http://dx.doi.org/10.1109/jsac.2007.071006

P.P. Papadimitratos, G. Mezzour, and J. Hubaux, Certificate Revocation List Distribution in Vehicular Communication Systems, Proc. Fifth ACM Int’l Workshop VehiculAr Inter-NETworking, pp. 86-87, 2008.
http://dx.doi.org/10.1145/1410043.1410062

K.P. Laberteaux, J.J. Haas, and Y. Hu, Security Certificate Revocation List Distribution for VANET, Proc. Fifth ACM int’l Workshop VehiculAr Inter-NETworking, pp. 88-89, 2008.
http://dx.doi.org/10.1145/1410043.1410063

Nowatkowski, Owen, Henry L, Certificate revocation list distribution in VANETs using Most Pieces Broadcast, IEEE SoutheastCon 2010, Mar 2010.
http://dx.doi.org/10.1109/secon.2010.5453881

Navdeep Kaur Randhawa, Design and Implementation PGP Algorithm in Vehicular Adhoc Networks, International Journal of Engineering Research and Applications., vol.2, Issue 3, May-Jun 2012,pp.647-650.

Vijayan R, A Novel approach for Implementing Security over Vehicular Ad hoc Network using Signcryption through Network Grid, International Journal of Advanced Computer Science and Applications, Vol 2, Issue 4, 2011.
http://dx.doi.org/10.14569/ijacsa.2011.020406

G. Anitha, Dr.M. Hemalatha, Intrusion prevention and Message Authentication Protocol (IMAP) using Region Based Certificate Revocation List Method in Vehicular Ad hoc Networks, International Journal of Engineering and Technology, Vol 6, Apr-May 2014.

Rhattoy, A., Zatni, A., Performance evaluation of OLSR and AODV routing protocols in VANETs urban area, (2013) International Review on Computers and Software (IRECOS), 8 (7), pp. 1711-1717.

Ahmed, S.A.M., Ariffin, S.H.S., Fisal, N., Contention free time efficient broadcasting protocol for safety applications in VANETs, (2014) International Review on Computers and Software (IRECOS), 9 (11), pp. 1923-1931.
http://dx.doi.org/10.15866/irecos.v9i11.4551

Prabakaran, M., Deepti, A.R., Mahadevan, G., Parvathy, R.M.S., Enhancement of Game Theoretic Approach USING Nash Equilibrium with Markov Chains for VANET Security, (2013) International Review on Computers and Software (IRECOS), 8 (4), pp. 900-903.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize