logo

SCIENCE CHINA Information Sciences, Volume 60, Issue 10: 100301(2017) https://doi.org/10.1007/s11432-017-9203-x

Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey

More info
  • ReceivedApr 22, 2017
  • AcceptedAug 2, 2017
  • PublishedSep 6, 2017

Abstract

Vehicular Ad hoc Networks (VANETs) are special kind of Mobile Ad hoc Networks (MANETs), where vehiclescommunicate with each other in ad hoc formation. VANETs consist of Vehicles and Road Side Units (RSUs) that assist inthe network management. Vehicles communicate with each other and RSUs, with the aim to provide infotainment and safety services on road. Security is an important consideration in VANETs as safety of humans (passengers) is an important issue. Vehicular Public Key Infrastructure (VPKI) is an adapted form of Public Key Infrastructure (PKI) used to achieve the key management and security services in VANETs. Certificate generation and revocation is one of the primary functions of VPKI. Certificate revocation is used for revoking the malicious nodes and terminate their access rights to the network. In this paper we classify revocation schemes in a novel way into centralized and decentralized manners. This paper covers a survey of different certificate revocation schemes, and provides an overview of the research in the area of certificate revocation in VANETs.


References

[1] Al-Sultan S, Al-Doori M M, Al-Bayatti A H. A comprehensive survey on vehicular Ad Hoc network. J Network Comp Appl, 2014, 37: 380-392 CrossRef Google Scholar

[2] Hafeez K A, Zhao L, Liao Z, at al. Impact of mobility on VANETS safety applications. In: Proceedings of Global Telecommunications Conference (GLOBECOM 2010), Miami, 2010. 1--5. Google Scholar

[3] Toor Y, Muhlethaler P, Laouiti A. Vehicle ad hoc networks: applications and related technical issues. IEEE Commun Surv Tutorials, 2008, 10: 74-88 CrossRef Google Scholar

[4] Foss T. Safe and secure intelligent transport systems (ITS). In: Proceedings of the Transport Research Arena (TRA) 5th Conference: Transport Solutions from Research to Deployment, Paris, 2014. Google Scholar

[5] Felt M, Gharachorloo N, Moshrefi A. Mobile taxi dispatch system. US Patent, 12/607782, 2009-10-28. Google Scholar

[6] Cao Y, Wang T, Kaiwartya O. An EV Charging Management System Concerning Drivers' Trip Duration and Mobility Uncertainty. IEEE Trans Syst Man Cybern Syst, 2016, : 1-12 CrossRef Google Scholar

[7] Cao Y, Ye M, Geyong M, et al. Vehicular-publish/subscribe (vp/s) communication enabled on-the-move ev charging management. IEEE Commun Mag, 2016, 54: 84--92. Google Scholar

[8] Hamida E, Noura H, Znaidi W. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures. Electronics, 2015, 4: 380-423 CrossRef Google Scholar

[9] Violence W H O, Prevention I, Organization W H. Global Status Report on Road Safety 2015: Supporting A Decade of Action. Geneva: World Health Organization, 2015. Google Scholar

[10] Khodaei M. Secure vehicular communication systems: design and implementation of a Vehicular PKI (VPKI). Dissertation for Master's Degree. Stockholm: Kungliga Tekniska Högskolan, 2012. Google Scholar

[11] Goyal V. Certificate revocation using fine grained certificate space partitioning. In: Proceedings of International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2007. 247--259. Google Scholar

[12] McDaniel P, Jamin S. Windowed certificate revocation. In: Proceedings of the 19th Annual Joint Conference on IEEE Computer and Communications Societies, Tel Aviv, 2000. 1406--1414. Google Scholar

[13] Falasi H A, Barka E. Revocation in VANETS: a survey. In: Proceedings of International Conference on Innovations in Information Technology (IIT), Abu Dhabi, 2011. 214--219. Google Scholar

[14] Wohlmacher P. Digital certificates: a survey of revocation methods. In: Proceedings of the ACM Workshops on Multimedia, Los Angeles, 2000. 111--114. Google Scholar

[15] Fiore M, Harri J, Filali F, et al. Vehicular mobility simulation for VANETS. In: Proceedings of the 40th Annual Simulation Symposium, Washington, 2007. 301--309. Google Scholar

[16] Uzcategui R A, Sucre A J D, Acosta-Marum G. Wave: a tutorial. IEEE Commun Mag, 2009, 47: 126--133. Google Scholar

[17] Hartenstein H, Laberteaux L. A tutorial survey on vehicular ad hoc networks. IEEE Commun Mag, 2008, 46: 164--171. Google Scholar

[18] Amadeo M, Campolo C, Molinaro A. Enhancing IEEE 802.11p/WAVE to provide infotainment applications in VANETs. Ad Hoc Networks, 2012, 10: 253-269 CrossRef Google Scholar

[19] Schoch E, Kargl F, Weber M. Communication patterns in VANETS. IEEE Commun Mag, 2008, 46: 119-125 CrossRef Google Scholar

[20] Biswas S, Mišić J, Mišić V. Ddos attack on wave-enabled vanet through synchronization. In: Proceedings of Global Communications Conference (GLOBECOM), Anaheim, 2012. 1079--1084. Google Scholar

[21] Kenney J B. Dedicated short-range communications (DSRC) standards in the united states. Proc IEEE, 2011, 99: 1162-1182 CrossRef Google Scholar

[22] Zeadally S, Hunt R, Chen Y S. Vehicular ad hoc networks (VANETS): status, results, and?challenges. Telecommun Syst, 2012, 50: 217-241 CrossRef Google Scholar

[23] Sujitha T, Devi S P. Intelligent transportation system for vehicular ad-hoc networks. Int J Emerg Technol Adv Eng, 2014, 2: 2250--2459. Google Scholar

[24] Wang Y, Li F. Vehicular ad hoc networks. In: Guide to Wireless Ad Hoc Networks. Berlin: Springer, 2009. 503--525. Google Scholar

[25] Jiang D, Taliwal V, Meier A, et al. Design of 5.9 GHz dsrc-based vehicular safety communication. IEEE Wirel Commun, 2006, 13: 36--43. Google Scholar

[26] Qu F, Wang F Y, Yang L. Intelligent transportation spaces: vehicles, traffic, communications, and beyond. IEEE Commun Mag, 2010, 48: 136--142. Google Scholar

[27] Santa J, Pere?íguez F, Moragón A. Experimental evaluation of CAM and DENM messaging services in vehicular communications. Transportation Res Part C-Emerging Technologies, 2014, 46: 98-120 CrossRef Google Scholar

[28] Wang N W, Huang Y M, Chen W M. A novel secure communication scheme in vehicular ad hoc networks. Comp Commun, 2008, 31: 2827-2837 CrossRef Google Scholar

[29] Araniti G, Campolo C, Condoluci M, et al. LTE for vehicular networking: a survey. IEEE Commun Mag, 2013, 51: 148--157. Google Scholar

[30] Schütze T. Automotive security: cryptography for car2X communication. In: Proceedings of Embedded World Conference, Nuremberg, 2011. 1--16. Google Scholar

[31] Bishop R. A survey of intelligent vehicle applications worldwide. In: Proceedings of the IEEE Intelligent Vehicles Symposium, Dearborn, 2000. 25--30. Google Scholar

[32] Yousefi S, Mousavi M S, Fathy M. Vehicular ad hoc networks (VANETS): challenges and perspectives. In: Proceedings of the 6th International Conference on ITS Telecommunications, Chengdu, 2006. 761--766. Google Scholar

[33] Cao Y, Wang N, Sun Z. A Reliable and Efficient Encounter-Based Routing Framework for Delay/Disruption Tolerant Networks. IEEE Sensors J, 2015, 15: 4004-4018 CrossRef Google Scholar

[34] Blum J, Eskandarian A. The threat of intelligent collisions. IT Prof, 2004, 6: 24--29. Google Scholar

[35] Kamat P, Baliga A, Trappe W. An identity-based security framework for VANETS. In: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks. Los Angeles, 2006. 94--95. Google Scholar

[36] Parno B, Perrig A. Challenges in securing vehicular networks. In: Proceedings of Workshop on Hot Topics in Networks (HotNets-IV) ACM, College Park, 2005. 1--6. Google Scholar

[37] Fuentes J M, González-Tablas A I, Ribagorda A. Overview of security issues in vehicular ad-hoc networks. In: Handbook of Reseach on Mobility and Computing. Hershey: IGI Globa, 2010. Google Scholar

[38] Leinmuller T, Schmidt R K, Schoch E, et al. Modeling roadside attacker behavior in VANETS. In: Proceedings of IEEE Globecom Workshops, New Orleans, 2008. 1--10. Google Scholar

[39] Qian Y, Lu K, Moayeri N. A secure vanet mac protocol for dsrc applications. In: Proceedings of IEEE Global Telecommunications Conference, New Orleans, 2008. 1--5. Google Scholar

[40] Pl??l K, Federrath H. A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Comp Standards Interfaces, 2008, 30: 390-397 CrossRef Google Scholar

[41] Sun J, Zhang C, Fang Y. An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: Proceedings of IEEE Military Communications Conference, Orlando, 2007. 1--7. Google Scholar

[42] Choi J, Jung S. A security framework with strong non-repudiation and privacy in VANETS. In: Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Las Vegas, 2009. 1--5. Google Scholar

[43] Yeun C Y, Al-Qutayri M, Al-Hawi F. Efficient security implementation for emerging VANETS. Ubiquit Comput Commun J, 2009, 4: 58--66. Google Scholar

[44] Grover J, Gaur M, Laxmi V. Sybil attack in VANETS. In: Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. Boca Raton: CRC Press, 2016. Google Scholar

[45] Xiao B, Yu B, Gao C. Detection and localization of sybil nodes in VANETS. In: Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles, 2006. 1--8. Google Scholar

[46] Mejri M N, Ben-Othman J, Hamdi M. Survey on VANET security challenges and possible cryptographic solutions. Vehicular Commun, 2014, 1: 53-66 CrossRef Google Scholar

[47] Raya M, Hubaux J P. Security aspects of inter-vehicle communications. In: Proceedings of the 5th Swiss Transport Research Conference (STRC), Ascona, 2005. Google Scholar

[48] Anoop M. Elliptic curve cryptography. An Implementation Guide, 2007. Google Scholar

[49] Schoch E, Kargl F. On the efficiency of secure beaconing in VANETS. In: Proceedings of the 3rd ACM Conference on Wireless Network Security, Hoboken, 2010. 111--116. Google Scholar

[50] Raya M, Papadimitratos P, Hubaux J P. Securing vehicular communications. IEEE Wirel Commun, 2006, 13: 8--15. Google Scholar

[51] Holguera C P. Integral communication security analysis and pki design for intelligent transportation systems. Dissertation for Master's Degree. Bochum: RUHR University Bochum, 2013. Google Scholar

[52] Zarki M E, Mehrotra S, Tsudik G, et al. Security issues in a future vehicular network. Eur Wirel, 2002, 35: 270--274. Google Scholar

[53] Papadimitratos P, Buttyan L, Hubaux J P, et al. Architecture for secure and private vehicular communications. In: Proceedings of the 7th International Conference on ITS Telecommunications, Sophia Antipolis, 2007. 1--6. Google Scholar

[54] Plobi K, Nowey T, Mletzko C. Towards a security architecture for vehicular ad hoc networks. In: Proceedings of the 1st International Conference on Availability, Reliability and Security, Vienna, 2006. 374--381. Google Scholar

[55] Doetzer F, Kohlmayer F, Kosch T, at al. Secure communication for intersection assistance. In: Proceedings of the 2nd International Workshop on Intelligent Transportation, Hamburg, 2005. Google Scholar

[56] Crescenzo G D, Zhang T. Efficient crl search in vehicular network PKIS. In: Proceedings of the 6th ACM Workshop on Digital Identity Management, Chicago, 2010. 17--26. Google Scholar

[57] Wasef A, Lu R, Lin X, et al. Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]. IEEE Wirel Commun, 2010, 17: 22--28. Google Scholar

[58] Housley R, Polk W, Ford W, et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical Report. 2002. Google Scholar

[59] Al-Hasan A S, Hossain M S, Atiquzzaman M. Security threats in vehicular ad hoc networks. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics, Jaipur, 2016. 404--411. Google Scholar

[60] Feng X, Li C, Chen D. A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw Appl, 2017, 10: 305-314 CrossRef Google Scholar

[61] Islam N. Certificate revocation in vehicular ad hoc networks: a novel approach. In: Proceedings of International Conference on Networking Systems and Security, Dhaka, 2016. 1--5. Google Scholar

[62] Raya M, Papadimitratos P, Aad I. Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J Select Areas Commun, 2007, 25: 1557-1568 CrossRef Google Scholar

[63] Schmidt R K, Leinmüller T, Schoch E, et al. Vehicle behavior analysis to enhance security in VANETS. In: Proceedings of the 4th Workshop on Vehicle-to-Vehicle Communications (V2VCOM2008), Istanbul, 2008. Google Scholar

[64] Golle P, Greene D, Staddon J. Detecting and correcting malicious data in VANETS. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, 2004. 29--37. Google Scholar

[65] Ghosh M, Varghese A, Kherani A A, et al. Distributed misbehavior detection in VANETS. In: Proceedings of IEEE Wireless Communications and Networking Conference, Budapest, 2009. 1--6. Google Scholar

[66] Bagchi S, Blough M, Santi P, et al. Diwans: workshop on dependability issues in wireless ad hoc networks and sensor networks. In: Proceedings of International Conference on Dependable Systems and Networks, Florence, 2004. Google Scholar

[67] Leinmuller T, Schoch E, Kargl F. Position verification approaches for vehicular ad hoc networks. IEEE Wirel Commun, 2006, 13: 16--21. Google Scholar

[68] Leinmüller T, Schoch E, Kargl F, et al. Influence of falsified position data on geographic ad-hoc routing. In: Proceedings of European Workshop on Security in Ad-hoc and Sensor Networks. Berlin: Springer, 2005. 102--112. Google Scholar

[69] Leinmüller T, Maihöfer C, Schoch E, et al. Improved security in geographic ad hoc routing through autonomous position verification. In: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, Los Angeles, 2006. 57--66. Google Scholar

[70] Kondareddy Y, Crescenzo G D, Agrawal P. Analysis of certificate revocation list distribution protocols for vehicular networks. In: Proceedings of Global Telecommunications Conference (GLOBECOM 2010), Miami, 2010. 1--5. Google Scholar

[71] Mahmoud M M, Misic J, Shen X. Efficient public-key certificate revocation schemes for smart grid. In: Proceedings of Global Communications Conference (GLOBECOM), Atlanta, 2013. 778--783. Google Scholar

[72] Gerlach M, Guttler F. Privacy in VANETS using changing pseudonyms-ideal and real. In: Proceedings of the 65th Vehicular Technology Conference, Dublin, 2007. 2521--2525. Google Scholar

[73] Tajeddine A, Kayssi A, Chehab A. A privacy-preserving trust model for VANETS. In: Proceedings of the 10th International Conference on Computer and Information Technology (CIT), Bradford, 2010. 832--837. Google Scholar

[74] Calandriello G, Papadimitratos P, Hubaux J P, et al. Efficient and robust pseudonymous authentication in vanet. In: Proceedings of the 4th ACM International Workshop on Vehicular Ad Hoc Networks, Montreal, 2007. 19--28. Google Scholar

[75] Dierks T. The Transport Layer Security (TLS) Protocol Version 1.2, 2008. Google Scholar

[76] Krawczyk H, Canetti R, Bellare M. Hmac: Keyed-hashing for message authentication. 1997. urlhttps://docs.python.org/2/library/hmac.html. Google Scholar

[77] Samara G, Al-Salihy W A, Sures R. Security issues and challenges of vehicular ad hoc networks (VANET). In: Proceedings of the 4th International Conference on New Trends in Information Science and Service Science (NISS), Gyeongju, 2010. 393--398. Google Scholar

[78] Cooper D A. A more efficient use of delta-crls. In: Proceedings of Symposium on Security and Privacy, Berkeley, 2000. 190--202. Google Scholar

[79] Raya M, Jungels D, Papadimitratos P, et al. Certificate revocation in vehicular networks. Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland, 2006. Google Scholar

[80] Nowatkowski M E, Owen H L. Certificate revocation list distribution in VANETS using most pieces broadcast. In: Proceedings of the IEEE SoutheastCon 2010, Concord, 2010. 238--241. Google Scholar

[81] Shokrollahi A. Raptor codes. IEEE Trans Inform Theor, 2006, 52: 2551-2567 CrossRef Google Scholar

[82] Lin W, Chiu D M, Lee Y. Erasure code replication revisited. In: Proceedings of the 4th International Conference on Peer-to-Peer Computing, Zurich, 2004. 90--97. Google Scholar

[83] Haas J J, Hu Y C, Laberteaux K P. Design and analysis of a lightweight certificate revocation mechanism for vanet. In: Proceedings of the 6th ACM International Workshop on VehiculAr Internetworking, Beijing, 2009. 89--98. Google Scholar

[84] Akhlaq M, Aslam B, Alserhani F, et al. Empowered certification authority in VANETS. In: Proceedings of International Conference on Advanced Information Networking and Applications Workshops, Washington, 2009. 181--186. Google Scholar

[85] Papadimitratos P P, Mezzour G, Hubaux J P. Certificate revocation list distribution in vehicular communication systems. In: Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking, San Francisco, 2008. 86--87. Google Scholar

[86] Laberteaux K P, Haas J J, Hu Y C. Security certificate revocation list distribution for vanet. In: Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking, San Francisco, 2008. 88--89. Google Scholar

[87] Amoozadeh M. Certificate revocation list distribution in vehicular communication systems. Dissertation for Master's Degree. Stockholm: Kungliga Tekniska Högskolan, 2012. Google Scholar

[88] Lin X, Lu R, Zhang C, et al. Security in vehicular ad hoc networks. IEEE Commun Mag, 2008, 46: 88--95. Google Scholar

[89] Papapanagiotou K, Marias G F, Georgiadis P. A certificate validation protocol for VANETS. In: Proceedings of IEEE Globecom Workshops, Washington, 2007. 1--9. Google Scholar

[90] Papapanagiotou K, Marias G, Georgiadis P, et al. Performance evaluation of a distributed ocsp protocol over manets. In: Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, Las Vegas, 2006. 1--5. Google Scholar

[91] Ga?án C, Mu?oz J L, Esparza O. PPREM: Privacy Preserving REvocation Mechanism for Vehicular Ad Hoc Networks. Comp Standards Interfaces, 2014, 36: 513-523 CrossRef Google Scholar

[92] Ga?án C, Mu?oz J L, Esparza O. EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks. Pervasive Mobile Computing, 2015, 21: 75-91 CrossRef Google Scholar

[93] Studer A, Shi E, Bai F, et al. Tacking together efficient authentication, revocation, and privacy in VANETS. In: Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, 2009. 1--9. Google Scholar

[94] Ruj S, Cavenaghi M A, Huang Z, et al. On data-centric misbehavior detection in VANETS. In: Proceedings of Vehicular Technology Conference (VTC Fall), San Francisco, 2011. 1--5. Google Scholar

[95] Ghosh M, Varghese A, Gupta A, et al. Misbehavior detection scheme with integrated root cause detection in vanet. In: Proceedings of the 6th ACM International Workshop on VehiculAr InterNETworking, Beijing, 2009. 123--124. Google Scholar

[96] Wasef A, Xuemin Shen A. Edr: efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans Veh Technol, 2009, 58: 5214-5224 CrossRef Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1