Abstract
Privacy and authenticity are two essential security attributes of secure Vehicle-to-Vehicle communications. Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to authenticate messages anonymously. But the infrastructure presence to communicate with the CA may not be ubiquitous, at least in the initial development phases of vehicular communication. Another proposal, PKI+ reduces dependence on the CA by allowing users to generate pseudonyms autonomously. However, user revocation in PKI+ is rather inconvenient, since it requires the entire network of non-revoked users to be reconfigured after each such event. In this paper, we propose PKI++, an improvement over PKI+, which brings together the desirable features of PKI and PKI+, namely autonomous certification and list-based revocation. We compare the proposed algorithm with PKI and PKI+, and show revocation to be less costly in PKI++.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Armknecht, F., Festag, A., Westhoff, D., Zeng, K.: Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: Proceedings of the 4th Workshop on Mobile Ad-Hoc Networks, WMAN, Bern, Switzerland (March 2007)
Beuchat, J.-L., López-Trejo, E., MartÃnez-Ramos, L., Mitsunari, S., RodrÃguez-HenrÃquez, F.: Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 413–432. Springer, Heidelberg (2009)
Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: On the performance of secure vehicular communication systems. IEEE Transactions on Dependable and Secure Computing 8, 898–912 (2011)
Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Vehicular Ad Hoc Networks, VANET 2007, pp. 19–28 (September 2007)
Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)
Fan, C.-I., Hsu, R.-H., Tseng, C.-H.: Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks. In: International Conference on Mobile Technology, Applications, and Systems, Mobility 2008, pp. 82:1–82:7. ACM (2008)
IEEE. IEEE trial-use standard for wireless access in vehicular environments - security services for applications and managemnet messages (July 2006), http://ieeexplore.ieee.org/xpl/standardstoc.jsp?isnumber=34648
Kamat, P., Baliga, A., Trappe, W.: An identity-based framework for VANETs. In: Third ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2006, Los Angeles, California, USA (September 2006)
Laberteaux, K.P., Hu, Y.-C., Haas, J.J.: Security Certificate Revocation List Distribution for VANET. In: Proceedings of ACM Mobicom International Workshop on Vehicular Ad Hoc Networks, VANET, pp. 88–89. ACM (September 2008)
Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks, HotNets-IV (2005)
Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.-P.: Certificate revocation in vehicular networks. Tech. report (2006)
Ren, W., Ren, K., Lou, W., Zhang, Y.: Efficient User Revocation for Privacy-aware PKI. In: Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness ICST, pp. 1–7 (2008)
Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together Efficient Authentication, Revocation, and Privacy in VANETs. In: Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, SECON 2009 (2009)
Weerasinghe, H., Fu, H.: ESAP: Efficient and scalable authentication protocol with conditional privacy for secure vehicular communications. In: 2010 IEEE GLOBECOM Workshops, pp. 1729–1734 (2010)
Zeng, K.: Pseudonymous PKI for Ubiquitous Computing. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 207–222. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bhattacharya, A.K., Das, A., Roychoudhury, D., Iyer, A., Bhattacharya, D. (2012). Autonomous Certification with List-Based Revocation for Secure V2V Communication. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-35130-3_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35129-7
Online ISBN: 978-3-642-35130-3
eBook Packages: Computer ScienceComputer Science (R0)