Skip to main content

MHT-Based Mechanism for Certificate Revocation in VANETs

  • Chapter
  • First Online:
Wireless Networking for Moving Objects

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8611))

  • 1029 Accesses

Abstract

Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A Public Key Infrastructure (PKI) can be utilized to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be immediately revoked and this status information has to be made available to other vehicles as soon as possible. The goal of this chapter is to introduce and describe in detail a certificate revocation mechanism based on the Merkle Hash Tree (MHT), which allows to efficiently distribute certificate revocation information in VANETs. For this, an extended-CRL is created by embedding a hash tree in each standard certificate revocation list (CRL). A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 KB) that fits in a single UDP message. This means that any node possessing an extended-CRL, including Road Side Units (RSUs) or intermediate vehicles, can produce short certificate-status responses that can be easily authenticated. The main procedures involved in the proposed mechanism are described in detail. General security issues related to the mechanism are treated as well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Certificates with pseudonyms contain a name that a the user assumes for operating in the VANET but that differs from his or her original or true name. These certificates are temporary.

  2. 2.

    Tamper-proof devices are designed to resist intentional malfunction or sabotage by any user with physical access to the device.

  3. 3.

    A Bloom filter is a space-efficient probabilistic data structure that is used to test whether an element is a member of a set.

  4. 4.

    To do this, an attacker needs to find a pre-image of a one way hash function which is computationally infeasible by definition.

References

  1. Bera, R.., Bera, J., Sil, S., Dogra, S., Sinha, N.B., Mondal, D.: Dedicated short range communications (DSRC) for intelligent transport system. In: 2006 IFIP International Conference on Wireless and Optical Communications Networks, pp. 5 (2006)

    Google Scholar 

  2. Jiang, D., Delgrossi, L.: IEEE 802.11p: towards an international standard for wireless access in vehicular environments. In: 2008 Vehicular Technology Conference, VTC Spring 2008. IEEE, pp. 2036–2040, May 2008

    Google Scholar 

  3. Raya, M., Hubaux, J.-P.: The security of vehicular ad hoc networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN ’05, pp. 11–21 (2005)

    Google Scholar 

  4. Hubaux, J.P., Capkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Secur. Priv. 2(3), 49–55 (2004)

    Article  Google Scholar 

  5. Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kargl, F., Kung, A., Raya, M.: Architecture for secure and private vehicular communications. In: 2007 7th International Conference on ITS Telecommunications, ITST ’07, pp. 1–6, June 2007

    Google Scholar 

  6. IEEE. IEEE trial-use standard for wireless access in vehicular environments - security services for applications and management messages. IEEE Std 1609.2-2006, pp. 1–117 (2006)

    Google Scholar 

  7. Ganchev, I., O’Droma, M.: New personal IPv6 address scheme and universal CIM card for UCWW. In: Proceedings of the 7th International Conference on Intelligent Transport Systems Telecommunications (ITST 2007), pp. 381–386, June 2007

    Google Scholar 

  8. Haas, J.J., Hu, Y.-C., Laberteaux, K.P.: Efficient certificate revocation list organization and distribution. IEEE J. Sel. Areas Commun. 29(3), 595–604 (2011)

    Article  Google Scholar 

  9. Wasef, A., Shen, X.: Maac: message authentication acceleration protocol for vehicular ad hoc networks. In: 2009 Global Telecommunications Conference, GLOBECOM 2009. IEEE, pp. 1–6, 30 November 2009–4 December 2009

    Google Scholar 

  10. Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.-P.: Secure vehicular communication systems: design and architecture. IEEE Commun. Mag. 46(11), 100–109 (2008)

    Article  Google Scholar 

  11. Laberteaux, K.P., Haas, J.J., Hu, Y.-C.: Security certificate revocation list distribution for vanet. In: Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking, VANET ’08, pp. 88–89 (2008)

    Google Scholar 

  12. Munoz, J.L., Forné, J., Esparza, O., Soriano, M.: Certificate revocation system implementation based on the Merkle hash tree. Int. J. Inf. Secur. (IJIS) 2(2), 110–124 (2004)

    Article  Google Scholar 

  13. Forné, J., Muñoz, J.L., Rey, M., Esparza, O.: Efficient certificate revocation system implementation: Huffman Merkle hash tree (huffmht). In: V Jornadas de Ingeniería Telemática, 09 (2005)

    Google Scholar 

  14. Wohlmacher, P.: Digital certificates: a survey of revocation methods. In: 2000 ACM Workshops on Multimedia, pp. 111–114. ACM Press, March 2000

    Google Scholar 

  15. Papadimitratos, P., Mezzour, G., Hubaux, J.-P.: Certificate revocation list distribution in vehicular communication systems. In: Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking, VANET ’08, pp. 86–87 (2008)

    Google Scholar 

  16. Wasef, A., Jiang, Y., Shen, X.: DCS: an efficient distributed-certificate-service scheme for vehicular networks. IEEE Trans. Veh. Technol. 59(2), 533–549 (2010)

    Article  Google Scholar 

  17. Fan, C.-I., Hsu, R.-H., Tseng, C.-H.: Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks. In: Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Mobility ’08, pp. 82:1–82:7 (2008)

    Google Scholar 

  18. Armknecht, F., Festag, A., Westhoff, D., Zeng, K.: Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: 4th Workshop on Mobile Ad-Hoc Networks (WMAN’07) (2007)

    Google Scholar 

  19. Marias, G.F., Papapanagiotou, K., Georgiadis, P.: ADOPT. a distributed ocsp for trust establishment in manets. In: 2005 11th European Wireless Conference (2005)

    Google Scholar 

  20. Moore, T., Clulow, J., Nagaraja, S., Anderson, R.: New strategies for revocation in ad-hoc networks. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 232–246. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  21. Wasef, A., Shen, X.: EDR: efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans. Veh. Technol. 58(9), 5214–5224 (2009)

    Article  Google Scholar 

  22. Raya, M., Manshaei, M.H., Félegyhazi, M., Hubaux, J.-P.: Revocation games in ephemeral networks. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS ’08, pp. 199–210 (2008)

    Google Scholar 

  23. Wasef, A., Shen, X.: EMAP expedite message authentication protocol for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 12, 78–89 (2013)

    Article  Google Scholar 

  24. Gañán, C., Muñoz, J.L., Esparza, O., Mata, J., Hernández-Serrano, J., Alins, J.: Coach: collaborative certificate status checking mechanism for vanets. J. Netw. Comput. Appl. (2012)

    Google Scholar 

  25. Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: Pprem: privacy preserving revocation mechanism for vehicular ad hoc networks. Comput. Stand. Inter. 36(3), 513–523 (2014)

    Article  Google Scholar 

  26. Gañán, C., Muñoz, J.L., Esparza, O., Loo, J., Mata-Díaz, J., Alins, J.: BECSI: bandwidth efficient certificate status information distribution mechanism for VANETs. Mob. Inf. Syst. 9(4), 347–370 (2013)

    Google Scholar 

  27. Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: Epa: an efficient and privacy-aware revocation mechanism for vehicular ad hoc networks. Pervasive and Mobile Computing (2014, in press)

    Google Scholar 

  28. Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: Toward revocation data handling efficiency in VANETs. In: Vinel, A., Mehmood, R., Berbineau, M., Garcia, C.R., Huang, C.-M., Chilamkurti, N. (eds.) Nets4Trains 2012 and Nets4Cars 2012. LNCS, vol. 7266, pp. 80–90. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  29. Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jose L. Muñoz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Muñoz, J.L., Esparza, O., Gañán, C., Mata-Díaz, J., Alins, J., Ganchev, I. (2014). MHT-Based Mechanism for Certificate Revocation in VANETs. In: Ganchev, I., Curado, M., Kassler, A. (eds) Wireless Networking for Moving Objects. Lecture Notes in Computer Science(), vol 8611. Springer, Cham. https://doi.org/10.1007/978-3-319-10834-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10834-6_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10833-9

  • Online ISBN: 978-3-319-10834-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics