Skip to main content

A Trusted Group-Based Revocation Process for Intelligent Transportation System

  • Conference paper
  • First Online:
Digital Economy. Emerging Technologies and Business Innovation (ICDEc 2019)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 358))

Included in the following conference series:

  • 1918 Accesses

Abstract

Intelligent Transportation System (ITS) aims to provide innovative services in the field of road transport and traffic management. This field includes infrastructure, vehicles and users, and interfaces with other modes of transport. Vehicles are capable of exchanging information by radio to improve road safety or allow internet access for passengers. Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities to cause accidents and endanger people life. The main concern arises how to maintain only the trustworthy participants and revoke the misbehaving ones. In this paper, we propose a new framework for the certificate revocation process within ITS. This process can be activated by Misbehavior Detection Systems (MDSs) running within vehicles and the Misbehavior Authority (MA) within the infrastructure. These MDSs rely on the trust evaluation for participating vehicles updated continuously based on their behaviors. Therefore, the revocation is done periodically through geographical Certificate Revocation List (CRL) which specifies the certificates of all revoked vehicles within a specific area. This results in a lightweight solution for CRL management and distribution within a modular and secure Public Key Infrastructure (PKI), based on group formation and trust evaluation. Simulations were carried out showing the advantages of the proposed revocation framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: VANET security challenges and solutions: a survey. Veh. Commun. 7, 7–20 (2017)

    Google Scholar 

  2. Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: Trust model for secure group leader-based communications in VANET. Wirel. Netw. J. 1–23 (2018). https://doi.org/10.1007/s11276-018-1756-6

  3. Hasrouny, H., Bassil, C., Samhat, A.E., Laouiti, A.: Security risk analysis of a trust model for secure group leader-based communication in VANET. In: Laouiti, A., Qayyum, A., Mohamad Saad, M.N. (eds.) Vehicular Ad-Hoc Networks for Smart Cities. AISC, vol. 548, pp. 71–83. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-3503-6_6

    Chapter  Google Scholar 

  4. Whyte, W., Weimerskirch, A., Kumar, V., Hehn, T.: A security credential management system for V2V communications. In: IEEE Vehicular Networking Conference, pp. 1–8 (2013)

    Google Scholar 

  5. Harding, J., et al.: Vehicle-to-vehicle communications: readiness of V2V technology for application. National Highway Traffic Safety Administration, Washington, DC, Technical report, DOT HS 812 014, August 2014

    Google Scholar 

  6. Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: Trust model for group leader selection in VANET. In: The 4th International Conference on CSCEET, April 2017

    Google Scholar 

  7. IEEE Standard for Wireless Access in Vehicular Environments-Security Services for Applications and Management Messages: IEEE Std 1609.2â„¢-2016

    Google Scholar 

  8. ETSI: PKI and roaming in its. In: 7th ETSI Security Workshop (2012)

    Google Scholar 

  9. NHTSA: Preliminary regulatory impact analysis FMVSS No. 150 vehicle-to-vehicle communication technology for light vehicles, Report no. DOT HS 812 359, December 2016

    Google Scholar 

  10. National Highway Traffic Safety Administration (NHTSA), Department of Transportation (DoT): Federal Motor Vehicle Safety Standards; V2V Communications, January 2016

    Google Scholar 

  11. EU-US ITS Task Force Standards Harmonization Working Group Harmonization Task Group 6: Cooperative-ITS Credential Management System Functional Analysis and Recommendations for Harmonization, Document HTG6-4, Version: 2015-09

    Google Scholar 

  12. Samara, G., Ramadas, S., Al-Salihy, W.A.H.: Design of simple and efficient revocation list distribution in urban areas for VANET’s. (IJCSIS) Int. J. Comput. Sci. Inf. Secur. 8(1) (2010)

    Google Scholar 

  13. Zhang, Q., Almulla, M., Ren, Y., Boukerche, A.: An efficient certificate revocation validation scheme with k-means clustering for vehicular ad hoc networks. In: IEEE Symposium on Computers and Communications (ISCC) (2012)

    Google Scholar 

  14. Nowatkowski, M.E., Owen, H.L.: Certificate revocation list distribution in VANETs using most pieces broadcast. In: Proceedings of the IEEE SoutheastCon, pp. 238–241 (2010)

    Google Scholar 

  15. Papadimitratos, P., Mezzour, Gh., Hubaux, J.-P.: Certificate revocation list distribution in vehicular communication systems. In: VANET 2008 Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking, pp. 86–87 (2008)

    Google Scholar 

  16. Studer, A., Shi, E., Bai, F., Perrig, A.: TACKing together efficient authentication, revocation, and privacy in VANETs. In: Proceeding of SECON 2009 Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 484–492 (2009)

    Google Scholar 

  17. Nowatkowski, M.E., Wolfgang, J.E., McManus, Ch., Owen, H.L.: The effects of limited lifetime pseudonyms on certificate revocation list size in VANETS. In: IEEE SoutheastCon (2010)

    Google Scholar 

  18. Haas, J.J., Hu, Y.-C., Laberteaux, K.P.: Efficient certificate revocation list organization and distribution. IEEE J. Sel. Areas Commun. 29(3), 594–604 (2011)

    Article  Google Scholar 

  19. Samara, Gh., Al-Salihy, W.A.H., Sures, R.: Security issues and challenges of vehicular ad hoc networks (VANET). In: Second International Conference on Network Applications, Protocols and Services (2010)

    Google Scholar 

  20. Singh, J.R., Kumar, A., Singh, D., Dewang, R.K.: A single-hop based fast certificate revocation protocol in VANET. In: IEEE International Conference on Computational Intelligence and Networks (2016)

    Google Scholar 

  21. Mallissery, S., Pai, M.M.M., Ajam, N., Pai, R.M., Mouzna, J.: Transport and traffic rule violation monitoring service in ITS: a secured VANET cloud application. In: 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) (2015)

    Google Scholar 

  22. Djamaludin, C.I., Foo, E., Camtepe, S., Corke, P.: Revocation and update of trust in autonomous delay tolerant networks. Comput. Secur. J. 60, 15–36 (2016)

    Article  Google Scholar 

  23. Rajput, U., Abbas, F., Eun, H., Oh, H.: A hybrid approach for efficient privacy preserving authentication in VANET. IEEE Access 5, 12014–12030 (2017)

    Article  Google Scholar 

  24. Caballero-Gil, C., Molina-Gil, J., Hernández-Serrano, J., León, O., Soriano-Ibañez, M.: Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Netw. J. 36, 482–494 (2016)

    Article  Google Scholar 

  25. Martín-Fernández, F., Caballero-Gil, P., Caballero-Gil, C.: Managing certificate revocation in VANETs using hash trees and query frequencies. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds.) EUROCAST 2015. LNCS, vol. 9520, pp. 57–63. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27340-2_8

    Chapter  Google Scholar 

  26. Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: EPA: an efficient and privacy-aware revocation mechanism for vehicular ad hoc networks. Pervasive Mob. Comput. J. 21, 75–91 (2015)

    Article  Google Scholar 

  27. Wasef, A., Lu, R., Lin, X., (Sherman) Shen, X.: Complementing public key infrastructure to secure vehicular ad hoc networks. IEEE Wirel. Commun. 17(5), 22-28 2010

    Google Scholar 

  28. https://www.cryptopp.com/benchmarks.html

  29. GrooveNet v2.0.1, Vehicle Network Simulator. In: The Second International Workshop on Vehicle-to-Vehicle Communications (V2VCOM), San Jose, USA, July 2006. https://github.com/mlab/GrooveNet. Accessed 2012

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamssa Hasrouny .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A. (2019). A Trusted Group-Based Revocation Process for Intelligent Transportation System. In: Jallouli, R., Bach Tobji, M., Bélisle, D., Mellouli, S., Abdallah, F., Osman, I. (eds) Digital Economy. Emerging Technologies and Business Innovation. ICDEc 2019. Lecture Notes in Business Information Processing, vol 358. Springer, Cham. https://doi.org/10.1007/978-3-030-30874-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30874-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30873-5

  • Online ISBN: 978-3-030-30874-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics