Skip to main content

Autonomous Certification with List-Based Revocation for Secure V2V Communication

  • Conference paper
Information Systems Security (ICISS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7671))

Included in the following conference series:

Abstract

Privacy and authenticity are two essential security attributes of secure Vehicle-to-Vehicle communications. Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to authenticate messages anonymously. But the infrastructure presence to communicate with the CA may not be ubiquitous, at least in the initial development phases of vehicular communication. Another proposal, PKI+ reduces dependence on the CA by allowing users to generate pseudonyms autonomously. However, user revocation in PKI+ is rather inconvenient, since it requires the entire network of non-revoked users to be reconfigured after each such event. In this paper, we propose PKI++, an improvement over PKI+, which brings together the desirable features of PKI and PKI+, namely autonomous certification and list-based revocation. We compare the proposed algorithm with PKI and PKI+, and show revocation to be less costly in PKI++.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Armknecht, F., Festag, A., Westhoff, D., Zeng, K.: Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: Proceedings of the 4th Workshop on Mobile Ad-Hoc Networks, WMAN, Bern, Switzerland (March 2007)

    Google Scholar 

  2. Beuchat, J.-L., López-Trejo, E., Martínez-Ramos, L., Mitsunari, S., Rodríguez-Henríquez, F.: Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 413–432. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: On the performance of secure vehicular communication systems. IEEE Transactions on Dependable and Secure Computing 8, 898–912 (2011)

    Article  Google Scholar 

  4. Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Vehicular Ad Hoc Networks, VANET 2007, pp. 19–28 (September 2007)

    Google Scholar 

  5. Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)

    Google Scholar 

  6. Fan, C.-I., Hsu, R.-H., Tseng, C.-H.: Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks. In: International Conference on Mobile Technology, Applications, and Systems, Mobility 2008, pp. 82:1–82:7. ACM (2008)

    Google Scholar 

  7. IEEE. IEEE trial-use standard for wireless access in vehicular environments - security services for applications and managemnet messages (July 2006), http://ieeexplore.ieee.org/xpl/standardstoc.jsp?isnumber=34648

  8. Kamat, P., Baliga, A., Trappe, W.: An identity-based framework for VANETs. In: Third ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2006, Los Angeles, California, USA (September 2006)

    Google Scholar 

  9. Laberteaux, K.P., Hu, Y.-C., Haas, J.J.: Security Certificate Revocation List Distribution for VANET. In: Proceedings of ACM Mobicom International Workshop on Vehicular Ad Hoc Networks, VANET, pp. 88–89. ACM (September 2008)

    Google Scholar 

  10. Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks, HotNets-IV (2005)

    Google Scholar 

  11. Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.-P.: Certificate revocation in vehicular networks. Tech. report (2006)

    Google Scholar 

  12. Ren, W., Ren, K., Lou, W., Zhang, Y.: Efficient User Revocation for Privacy-aware PKI. In: Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness ICST, pp. 1–7 (2008)

    Google Scholar 

  13. Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together Efficient Authentication, Revocation, and Privacy in VANETs. In: Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, SECON 2009 (2009)

    Google Scholar 

  14. Weerasinghe, H., Fu, H.: ESAP: Efficient and scalable authentication protocol with conditional privacy for secure vehicular communications. In: 2010 IEEE GLOBECOM Workshops, pp. 1729–1734 (2010)

    Google Scholar 

  15. Zeng, K.: Pseudonymous PKI for Ubiquitous Computing. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 207–222. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhattacharya, A.K., Das, A., Roychoudhury, D., Iyer, A., Bhattacharya, D. (2012). Autonomous Certification with List-Based Revocation for Secure V2V Communication. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35130-3_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35129-7

  • Online ISBN: 978-3-642-35130-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics