Skip to main content

Managing Certificate Revocation in VANETs Using Hash Trees and Query Frequencies

  • Conference paper
  • First Online:
Computer Aided Systems Theory – EUROCAST 2015 (EUROCAST 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9520))

Included in the following conference series:

Abstract

Due to the proliferation of technology in different areas of daily life, many new types of communication networks are emerging. Among the most interesting wireless networks, Vehicular Ad-hoc Networks are remarkable because road safety and traffic efficiency are two advances that any developed society should undertake. Therefore, research on such networks should evolve to take the final step and move from theory to reality. However, first, it is necessary to improve many aspects related to security. In particular, identification and management of malicious users within the network are major research issues. The traditional method using revocation lists to manage these users becomes very inefficient when the network grows. This paper proposes an alternative method to efficiently manage malicious users, which uses hash trees and query frequencies in order to fit better with the needs of Vehicular Ad-hoc Networks.

Research supported by TIN2011-25452, BES-2012-051817, IPT-2012-0585-370000 and RTC-2014-1648-8.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320–337. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  2. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document version 2.1, Updated submission to NIST (Round 2) (2010)

    Google Scholar 

  3. Cooper, D.A.: A model of certificate revocation. In: Proceedings of the 15th Annual Computer Security Applications Conference (1999)

    Google Scholar 

  4. Cooper, D.A.: A more efficient use of delta CRLs. In: Proceedings of the IEEE Symposium on Security and Privacy (2000)

    Google Scholar 

  5. Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: Toward revocation data handling efficiency in VANETs. In: Vinel, A., Mehmood, R., Berbineau, M., Garcia, C.R., Huang, C.-M., Chilamkurti, N. (eds.) Nets4Trains 2012 and Nets4Cars 2012. LNCS, vol. 7266, pp. 80–90. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Huffman, D.: A method for the construction of minimum-redundancy codes. Proc. IRE 40(9), 1098–1101 (1952)

    Article  MATH  Google Scholar 

  7. Jakobsson, M., Wetzel, S.: Efficient attribute authentication with applications to Ad Hoc networks. In: ACM Workshop on Vehicular Ad Hoc Networks, pp. 38–46 (2004)

    Google Scholar 

  8. McMichael, A.J.: The urban environment and health in a world of increasing globalization: issues for developing countries. Bull. World Health Organ. 78(9), 1117–1126 (2000)

    Google Scholar 

  9. Muñoz, J.L., Forné, J., Esparza, O., Rey, M.: Efficient certificate revocation system implementation: huffman merkle hash tree (HuffMHT). In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 119–127. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Papapanagiotou, K., Marias, G.F., Georgiadis, P.: A certificate validation protocol for VANETs. In: Globecom Workshops IEEE, pp. 1–9 (2007)

    Google Scholar 

  11. Serna Olvera, J., Casola, V., Rak, M., Luna, J., Medina, M., Mazzocca, N.: Performance analysis of an OCSP-Based authentication protocol for VANETs. Int. J. Adapt. Resilient and Auton. Syst. (IJARAS) 3(1), 19–45 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to F. Martín-Fernández or P. Caballero-Gil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Martín-Fernández, F., Caballero-Gil, P., Caballero-Gil, C. (2015). Managing Certificate Revocation in VANETs Using Hash Trees and Query Frequencies. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2015. EUROCAST 2015. Lecture Notes in Computer Science(), vol 9520. Springer, Cham. https://doi.org/10.1007/978-3-319-27340-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27340-2_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27339-6

  • Online ISBN: 978-3-319-27340-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics