Abstract
Due to the proliferation of technology in different areas of daily life, many new types of communication networks are emerging. Among the most interesting wireless networks, Vehicular Ad-hoc Networks are remarkable because road safety and traffic efficiency are two advances that any developed society should undertake. Therefore, research on such networks should evolve to take the final step and move from theory to reality. However, first, it is necessary to improve many aspects related to security. In particular, identification and management of malicious users within the network are major research issues. The traditional method using revocation lists to manage these users becomes very inefficient when the network grows. This paper proposes an alternative method to efficiently manage malicious users, which uses hash trees and query frequencies in order to fit better with the needs of Vehicular Ad-hoc Networks.
Research supported by TIN2011-25452, BES-2012-051817, IPT-2012-0585-370000 and RTC-2014-1648-8.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320–337. Springer, Heidelberg (2012)
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document version 2.1, Updated submission to NIST (Round 2) (2010)
Cooper, D.A.: A model of certificate revocation. In: Proceedings of the 15th Annual Computer Security Applications Conference (1999)
Cooper, D.A.: A more efficient use of delta CRLs. In: Proceedings of the IEEE Symposium on Security and Privacy (2000)
Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: Toward revocation data handling efficiency in VANETs. In: Vinel, A., Mehmood, R., Berbineau, M., Garcia, C.R., Huang, C.-M., Chilamkurti, N. (eds.) Nets4Trains 2012 and Nets4Cars 2012. LNCS, vol. 7266, pp. 80–90. Springer, Heidelberg (2012)
Huffman, D.: A method for the construction of minimum-redundancy codes. Proc. IRE 40(9), 1098–1101 (1952)
Jakobsson, M., Wetzel, S.: Efficient attribute authentication with applications to Ad Hoc networks. In: ACM Workshop on Vehicular Ad Hoc Networks, pp. 38–46 (2004)
McMichael, A.J.: The urban environment and health in a world of increasing globalization: issues for developing countries. Bull. World Health Organ. 78(9), 1117–1126 (2000)
Muñoz, J.L., Forné, J., Esparza, O., Rey, M.: Efficient certificate revocation system implementation: huffman merkle hash tree (HuffMHT). In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 119–127. Springer, Heidelberg (2005)
Papapanagiotou, K., Marias, G.F., Georgiadis, P.: A certificate validation protocol for VANETs. In: Globecom Workshops IEEE, pp. 1–9 (2007)
Serna Olvera, J., Casola, V., Rak, M., Luna, J., Medina, M., Mazzocca, N.: Performance analysis of an OCSP-Based authentication protocol for VANETs. Int. J. Adapt. Resilient and Auton. Syst. (IJARAS) 3(1), 19–45 (2012)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Martín-Fernández, F., Caballero-Gil, P., Caballero-Gil, C. (2015). Managing Certificate Revocation in VANETs Using Hash Trees and Query Frequencies. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2015. EUROCAST 2015. Lecture Notes in Computer Science(), vol 9520. Springer, Cham. https://doi.org/10.1007/978-3-319-27340-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-27340-2_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27339-6
Online ISBN: 978-3-319-27340-2
eBook Packages: Computer ScienceComputer Science (R0)