Skip to main content

An Efficient Mechanism for Revocation of Malicious Nodes in Vehicular Ad Hoc Networks

  • Conference paper
  • First Online:
Intelligence in Big Data Technologies—Beyond the Hype

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1167))

  • 987 Accesses

Abstract

Revocation of malicious nodes in vehicular ad hoc network (VANET) is the major issue that has received a lot of attention. This paper mainly focuses on developing a mechanism for revoking the misbehaved node in VANET. The current approaches mainly rely on certificate revocation list (CRL) to distribute the certificate revocation information which incurs a long delay based on the CRL file size (bytes to megabyte), high processing overhead, storage space and consumes more resources for certificate validation. To achieve the purpose of this paper, Merkle Hash Tree (MHT) is constructed for distributing the information about the revocation of certificates. Certificate authority (CA) is the trusted third party in the vehicular cloud (VC) which issues certificate to the vehicles through the road-side unit (RSU).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. A. Alrawais, A.R. Alhothaily, B. Mei, T. Song, X. Cheng, An efficient revocation scheme for vehicular ad-hoc networks. 2017 international conference on identification, information and knowledge in the internet of things, Procedia Comp. Sci. 129, 312–318 (2018)

    Google Scholar 

  2. D. Singh, Ranvijay, R.S. Yadav, A state-of-art approach to misbehaviour detection and revocation in VANET: survey. Int. J. Ad Hoc Ubiquitous Comput. 28(2), (2018)

    Google Scholar 

  3. T. Khan, N. Ahmad, Y. Cao, Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey, vol. 60 (Springer-Verlag Berlin Heidelber, Science China Press, 2017)

    Google Scholar 

  4. M. Mansour, C. Salama, H. Mohamed, S.A. Hammad, VANET security and privacy—An overview. Int. J. Netw. Secur. Appl. 10, 13–34 (2018)

    Google Scholar 

  5. Supriya Kamble, Puja Padiya, Nilesh Marathe, Misbehavior eviction from VANETs. Int. J. Adv. Comput. Eng. Networking 3(12), 115–119 (2015)

    Google Scholar 

  6. M. Arshad, Z. Ullah, N. Ahmad, M. Khalid, H. Criuckshank, Y. Cao, A survey of local/cooperative-based malicious information detection techniques in VANETs. EURASIP J. Wireless Commun. Networking. (2018)

    Google Scholar 

  7. N. Shamsi, R.B. Nagagoudar, A. Patil, Efficient certificate revocation with vindication capability for mobile ad-hoc networks. Int. J. Comp. Sci. Inf. Technol. 5(3), 4265–4271 (2014)

    Google Scholar 

  8. N. Kattimani, G. Bhaskar, Analysis of security challenges and implementation of security mechanism in vehicular cloud computing. Int. J. Curr. Eng. Sci. Res. 2(7), 155–159 (2015)

    Google Scholar 

  9. H.M. Hamad, A.B. AlQazzaz, Design a cloud security model in VANET communication: Implementation, performance and security analysis. Int. J. Comput. Appl. 146(4), 1–7 (2016)

    Google Scholar 

  10. Jeyalakshmi, Ann Nita Netto.: An authenticated collaborative grid-based on-road localization scheme for VANETs. Int. J. Eng. Res. Rev. 3(3), 77–83 (2015)

    Google Scholar 

  11. R. Singh, S. Miglani, Efficient and Secure Message Transfer in VANET. 2016 International Conference on Inventive Computation Technologies (ICICT), IEEE Xplore (2016). pp. 1–5

    Google Scholar 

  12. H.A. Falasi, E. Barka, Revocation in VANETs: A Survey. 2011 International Conference on Innovations in Information Technology, IEEE Xplore (2011), pp. 214–219

    Google Scholar 

  13. Z. Abdulkader, A. Abdullah, M.T. Abdullah, Z.A. Zukarnain, Malicious node identification routing and protection mechanism for VANET against various attacks. J. Inf. Secur. Res. 8(4), 161–177 (2017)

    Google Scholar 

  14. A. Daeinabi, A.G. Rahbar, An advanced security scheme based on clustering and key distribution in vehicular ad-hoc networks. Comput. Electr. Eng. 40(2), 517–529 (2014)

    Article  Google Scholar 

  15. C. Ganan, J.L. Munoz, O. Esparza, J. Mata-Diaz, J. Alins, PPREM: privacy preserving REvocation mechanism for vehicular ad hoc networks. Comput. Stan. Interfaces 36(3), 513–523 (2014)

    Article  Google Scholar 

  16. J. Liu, Z. Wu, J. Dong, J. Wu, D. Wen, An energy-efficient failure detector for vehicular cloud computing. Plos one 13(1), 1–17 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Jeevitha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jeevitha, R., Sudha Bhuvaneswari, N. (2021). An Efficient Mechanism for Revocation of Malicious Nodes in Vehicular Ad Hoc Networks. In: Peter, J., Fernandes, S., Alavi, A. (eds) Intelligence in Big Data Technologies—Beyond the Hype. Advances in Intelligent Systems and Computing, vol 1167. Springer, Singapore. https://doi.org/10.1007/978-981-15-5285-4_31

Download citation

Publish with us

Policies and ethics