Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey

Abstract

Vehicular Ad hoc Networks (VANETs) are special kind of Mobile Ad hoc Networks (MANETs), where vehicles communicate with each other in ad hoc formation. VANETs consist of Vehicles and Road Side Units (RSUs) that assist in the network management. Vehicles communicate with each other and RSUs, with the aim to provide infotainment and safety services on road. Security is an important consideration in VANETs as safety of humans (passengers) is an important issue. Vehicular Public Key Infrastructure (VPKI) is an adapted form of Public Key Infrastructure (PKI) used to achieve the key management and security services in VANETs. Certificate generation and revocation is one of the primary functions of VPKI. Certificate revocation is used for revoking the malicious nodes and terminate their access rights to the network. In this paper we classify revocation schemes in a novel way into centralized and decentralized manners. This paper covers a survey of different certificate revocation schemes, and provides an overview of the research in the area of certificate revocation in VANETs.

This is a preview of subscription content, log in to check access.

References

  1. 1

    Al-Sultan S, Al-Doori M M, Al-Bayatti A H, et al. A comprehensive survey on vehicular ad hoc network. J Netw Comput Appl, 2014, 37: 380–392

  2. 2

    Hafeez K A, Zhao L, Liao Z, at al. Impact of mobility on VANETS safety applications. In: Proceedings of Global Telecommunications Conference (GLOBECOM 2010), Miami, 2010. 1–5

  3. 3

    Toor Y, Muhlethaler P, Laouiti A, et al. Vehicle ad hoc networks: applications and related technical issues. IEEE Commun Surv Tut, 2008, 10: 74–88

  4. 4

    Foss T. Safe and secure intelligent transport systems (ITS). In: Proceedings of the Transport Research Arena (TRA) 5th Conference: Transport Solutions from Research to Deployment, Paris, 2014

  5. 5

    Felt M, Gharachorloo N, Moshrefi A. Mobile taxi dispatch system. US Patent, 12/607782, 2009-10-28

  6. 6

    Cao Y, Wang T, Kaiwartya O, et al. An ev charging management system concerning drivers’ trip duration and mobility uncertainty. IEEE Trans Syst Man Cyber Syst, 2016. doi: 10.1109/TSMC.2016.2613600

  7. 7

    Cao Y, Ye M, Geyong M, et al. Vehicular-publish/subscribe (vp/s) communication enabled on-the-move ev charging management. IEEE Commun Mag, 2016, 54: 84–92

  8. 8

    Hamida E B, Noura H, Znaidi W. Security of cooperative intelligent transport systems: standards, threats analysis and cryptographic countermeasures. Electronics, 2015, 4: 380–423

  9. 9

    Violence W H O, Prevention I, Organization W H. Global Status Report on Road Safety 2015: Supporting A Decade of Action. Geneva: World Health Organization, 2015

  10. 10

    Khodaei M. Secure vehicular communication systems: design and implementation of a Vehicular PKI (VPKI). Dissertation for Master’s Degree. Stockholm: Kungliga Tekniska Högskolan, 2012

  11. 11

    Goyal V. Certificate revocation using fine grained certificate space partitioning. In: Proceedings of International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2007. 247–259

  12. 12

    McDaniel P, Jamin S. Windowed certificate revocation. In: Proceedings of the 19th Annual Joint Conference on IEEE Computer and Communications Societies, Tel Aviv, 2000. 1406–1414

  13. 13

    Falasi H A, Barka E. Revocation in VANETS: a survey. In: Proceedings of International Conference on Innovations in Information Technology (IIT), Abu Dhabi, 2011. 214–219

  14. 14

    Wohlmacher P. Digital certificates: a survey of revocation methods. In: Proceedings of the ACM Workshops on Multimedia, Los Angeles, 2000. 111–114

  15. 15

    Fiore M, Harri J, Filali F, et al. Vehicular mobility simulation for VANETS. In: Proceedings of the 40th Annual Simulation Symposium, Washington, 2007. 301–309

  16. 16

    Uzcategui R A, Sucre A J D, Acosta-Marum G. Wave: a tutorial. IEEE Commun Mag, 2009, 47: 126–133

  17. 17

    Hartenstein H, Laberteaux L. A tutorial survey on vehicular ad hoc networks. IEEE Commun Mag, 2008, 46: 164–171

  18. 18

    Amadeo M, Campolo C, Molinaro A. Enhancing IEEE 802.11 p/wave to provide infotainment applications in VANETS. Ad Hoc Netw, 2012, 10: 253–269

  19. 19

    Schoch E, Kargl F, Weber M. Communication patterns in VANETS. IEEE Commun Mag, 2008, 46: 119–125

  20. 20

    Biswas S, Mišić J, Mišić V. Ddos attack on wave-enabled vanet through synchronization. In: Proceedings of Global Communications Conference (GLOBECOM), Anaheim, 2012. 1079–1084

  21. 21

    Kenney J B. Dedicated short-range communications (DSRC) standards in the united states. Proc IEEE, 2011, 99: 1162–1182

  22. 22

    Zeadally S, Hunt R, Chen Y S, et al. Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun Syst, 2012, 50: 217–241

  23. 23

    Sujitha T, Devi S P. Intelligent transportation system for vehicular ad-hoc networks. Int J Emerg Technol Adv Eng, 2014, 2: 2250–2459

  24. 24

    Wang Y, Li F. Vehicular ad hoc networks. In: Guide to Wireless Ad Hoc Networks. Berlin: Springer, 2009. 503–525

  25. 25

    Jiang D, Taliwal V, Meier A, et al. Design of 5.9 GHz dsrc-based vehicular safety communication. IEEE Wirel Commun, 2006, 13: 36–43

  26. 26

    Qu F, Wang F Y, Yang L. Intelligent transportation spaces: vehicles, traffic, communications, and beyond. IEEE Commun Mag, 2010, 48: 136–142

  27. 27

    Santa J, Pere˜níguez F, Moragón A, et al. Experimental evaluation of cam and denm messaging services in vehicular communications. Transp Res Part C Emerg Technol, 2014, 46: 98–120

  28. 28

    Wang N W, Huang Y M, Chen W M. A novel secure communication scheme in vehicular ad hoc networks. Comput Commun, 2008, 31: 2827–2837

  29. 29

    Araniti G, Campolo C, Condoluci M, et al. LTE for vehicular networking: a survey. IEEE Commun Mag, 2013, 51: 148–157

  30. 30

    Schütze T. Automotive security: cryptography for car2X communication. In: Proceedings of Embedded World Conference, Nuremberg, 2011. 1–16

  31. 31

    Bishop R. A survey of intelligent vehicle applications worldwide. In: Proceedings of the IEEE Intelligent Vehicles Symposium, Dearborn, 2000. 25–30

  32. 32

    Yousefi S, Mousavi M S, Fathy M. Vehicular ad hoc networks (VANETS): challenges and perspectives. In: Proceedings of the 6th International Conference on ITS Telecommunications, Chengdu, 2006. 761–766

  33. 33

    Cao Y, Wang N, Sun Z, et al. A reliable and efficient encounter-based routing framework for delay/disruption tolerant networks. IEEE Sensor J, 2015, 15: 4004–4018

  34. 34

    Blum J, Eskandarian A. The threat of intelligent collisions. IT Prof, 2004, 6: 24–29

  35. 35

    Kamat P, Baliga A, Trappe W. An identity-based security framework for VANETS. In: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks. Los Angeles, 2006. 94–95

  36. 36

    Parno B, Perrig A. Challenges in securing vehicular networks. In: Proceedings of Workshop on Hot Topics in Networks (HotNets-IV) ACM, College Park, 2005. 1–6

  37. 37

    Fuentes J M, González-Tablas A I, Ribagorda A. Overview of security issues in vehicular ad-hoc networks. In: Handbook of Reseach on Mobility and Computing. Hershey: IGI Globa, 2010

  38. 38

    Leinmuller T, Schmidt R K, Schoch E, et al. Modeling roadside attacker behavior in VANETS. In: Proceedings of IEEE Globecom Workshops, New Orleans, 2008. 1–10

  39. 39

    Qian Y, Lu K, Moayeri N. A secure vanet mac protocol for dsrc applications. In: Proceedings of IEEE Global Telecommunications Conference, New Orleans, 2008. 1–5

  40. 40

    Plößl K, Federrath H. A privacy aware and efficient security infrastructure for vehicular ad hoc networks. Comput Stand Inter, 2008, 30: 390–397

  41. 41

    Sun J, Zhang C, Fang Y. An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks. In: Proceedings of IEEE Military Communications Conference, Orlando, 2007. 1–7

  42. 42

    Choi J, Jung S. A security framework with strong non-repudiation and privacy in VANETS. In: Proceedings of the 6th IEEE Consumer Communications and Networking Conference, Las Vegas, 2009. 1–5

  43. 43

    Yeun C Y, Al-Qutayri M, Al-Hawi F. Efficient security implementation for emerging VANETS. Ubiquit Comput Commun J, 2009, 4: 58–66

  44. 44

    Grover J, Gaur M, Laxmi V. Sybil attack in VANETS. In: Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. Boca Raton: CRC Press, 2016

  45. 45

    Xiao B, Yu B, Gao C. Detection and localization of sybil nodes in VANETS. In: Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles, 2006. 1–8

  46. 46

    Mejri M N, Ben-Othman J, Hamdi M. Survey on vanet security challenges and possible cryptographic solutions. Veh Commun, 2014, 1: 53–66

  47. 47

    Raya M, Hubaux J P. Security aspects of inter-vehicle communications. In: Proceedings of the 5th Swiss Transport Research Conference (STRC), Ascona, 2005

  48. 48

    Anoop M. Elliptic curve cryptography. An Implementation Guide, 2007

  49. 49

    Schoch E, Kargl F. On the efficiency of secure beaconing in VANETS. In: Proceedings of the 3rd ACM Conference on Wireless Network Security, Hoboken, 2010. 111–116

  50. 50

    Raya M, Papadimitratos P, Hubaux J P. Securing vehicular communications. IEEE Wirel Commun, 2006, 13: 8–15

  51. 51

    Holguera C P. Integral communication security analysis and pki design for intelligent transportation systems. Dissertation for Master’s Degree. Bochum: RUHR University Bochum, 2013

  52. 52

    Zarki M E, Mehrotra S, Tsudik G, et al. Security issues in a future vehicular network. Eur Wirel, 2002, 35: 270–274

  53. 53

    Papadimitratos P, Buttyan L, Hubaux J P, et al. Architecture for secure and private vehicular communications. In: Proceedings of the 7th International Conference on ITS Telecommunications, Sophia Antipolis, 2007. 1–6

  54. 54

    Plobi K, Nowey T, Mletzko C. Towards a security architecture for vehicular ad hoc networks. In: Proceedings of the 1st International Conference on Availability, Reliability and Security, Vienna, 2006. 374–381

  55. 55

    Doetzer F, Kohlmayer F, Kosch T, at al. Secure communication for intersection assistance. In: Proceedings of the 2nd International Workshop on Intelligent Transportation, Hamburg, 2005

  56. 56

    Crescenzo G D, Zhang T. Efficient crl search in vehicular network PKIS. In: Proceedings of the 6th ACM Workshop on Digital Identity Management, Chicago, 2010. 17–26

  57. 57

    Wasef A, Lu R, Lin X, et al. Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]. IEEE Wirel Commun, 2010, 17: 22–28

  58. 58

    Housley R, Polk W, Ford W, et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical Report. 2002

  59. 59

    Al-Hasan A S, Hossain M S, Atiquzzaman M. Security threats in vehicular ad hoc networks. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics, Jaipur, 2016. 404–411

  60. 60

    Feng X, Li C Y, Chen D X, et al. A method for defensing against multi-source Sybil attacks in VANET. Peer Peer Netw Appl, 2017, 10: 305–314

  61. 61

    Islam N. Certificate revocation in vehicular ad hoc networks: a novel approach. In: Proceedings of International Conference on Networking Systems and Security, Dhaka, 2016. 1–5

  62. 62

    Raya M, Papadimitratos P, Aad I, et al. Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J Sel Area Commun, 2007, 25: 1557–1568

  63. 63

    Schmidt R K, Leinmüller T, Schoch E, et al. Vehicle behavior analysis to enhance security in VANETS. In: Proceedings of the 4th Workshop on Vehicle-to-Vehicle Communications (V2VCOM2008), Istanbul, 2008

  64. 64

    Golle P, Greene D, Staddon J. Detecting and correcting malicious data in VANETS. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, 2004. 29–37

  65. 65

    Ghosh M, Varghese A, Kherani A A, et al. Distributed misbehavior detection in VANETS. In: Proceedings of IEEE Wireless Communications and Networking Conference, Budapest, 2009. 1–6

  66. 66

    Bagchi S, Blough M, Santi P, et al. Diwans: workshop on dependability issues in wireless ad hoc networks and sensor networks. In: Proceedings of International Conference on Dependable Systems and Networks, Florence, 2004

  67. 67

    Leinmuller T, Schoch E, Kargl F. Position verification approaches for vehicular ad hoc networks. IEEEWirel Commun, 2006, 13: 16–21

  68. 68

    Leinmüller T, Schoch E, Kargl F, et al. Influence of falsified position data on geographic ad-hoc routing. In: Proceedings of European Workshop on Security in Ad-hoc and Sensor Networks. Berlin: Springer, 2005. 102–112

  69. 69

    Leinmüller T, Maihöfer C, Schoch E, et al. Improved security in geographic ad hoc routing through autonomous position verification. In: Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks, Los Angeles, 2006. 57–66

  70. 70

    Kondareddy Y, Crescenzo G D, Agrawal P. Analysis of certificate revocation list distribution protocols for vehicular networks. In: Proceedings of Global Telecommunications Conference (GLOBECOM 2010), Miami, 2010. 1–5

  71. 71

    Mahmoud M M, Misic J, Shen X. Efficient public-key certificate revocation schemes for smart grid. In: Proceedings of Global Communications Conference (GLOBECOM), Atlanta, 2013. 778–783

  72. 72

    Gerlach M, Guttler F. Privacy in VANETS using changing pseudonyms-ideal and real. In: Proceedings of the 65th Vehicular Technology Conference, Dublin, 2007. 2521–2525

  73. 73

    Tajeddine A, Kayssi A, Chehab A. A privacy-preserving trust model for VANETS. In: Proceedings of the 10th International Conference on Computer and Information Technology (CIT), Bradford, 2010. 832–837

  74. 74

    Calandriello G, Papadimitratos P, Hubaux J P, et al. Efficient and robust pseudonymous authentication in vanet. In: Proceedings of the 4th ACM International Workshop on Vehicular Ad Hoc Networks, Montreal, 2007. 19–28

  75. 75

    Dierks T. The Transport Layer Security (TLS) Protocol Version 1.2, 2008

  76. 76

    Krawczyk H, Canetti R, Bellare M. Hmac: Keyed-hashing for message authentication. 1997. https://docs.python.org/ 2/library/hmac.html

  77. 77

    Samara G, Al-Salihy WA, Sures R. Security issues and challenges of vehicular ad hoc networks (VANET). In: Proceedings of the 4th International Conference on New Trends in Information Science and Service Science (NISS), Gyeongju, 2010. 393–398

  78. 78

    Cooper D A. A more efficient use of delta-crls. In: Proceedings of Symposium on Security and Privacy, Berkeley, 2000. 190–202

  79. 79

    Raya M, Jungels D, Papadimitratos P, et al. Certificate revocation in vehicular networks. Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland, 2006

  80. 80

    Nowatkowski M E, Owen H L. Certificate revocation list distribution in VANETS using most pieces broadcast. In: Proceedings of the IEEE SoutheastCon 2010, Concord, 2010. 238–241

  81. 81

    Shokrollahi A. Raptor codes. IEEE Trans Inf Theory, 2006, 52: 2551–2567

  82. 82

    Lin W, Chiu D M, Lee Y. Erasure code replication revisited. In: Proceedings of the 4th International Conference on Peer-to-Peer Computing, Zurich, 2004. 90–97

  83. 83

    Haas J J, Hu Y C, Laberteaux K P. Design and analysis of a lightweight certificate revocation mechanism for vanet. In: Proceedings of the 6th ACM International Workshop on VehiculAr Internetworking, Beijing, 2009. 89–98

  84. 84

    Akhlaq M, Aslam B, Alserhani F, et al. Empowered certification authority in VANETS. In: Proceedings of International Conference on Advanced Information Networking and Applications Workshops, Washington, 2009. 181–186

  85. 85

    Papadimitratos P P, Mezzour G, Hubaux J P. Certificate revocation list distribution in vehicular communication systems. In: Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking, San Francisco, 2008. 86–87

  86. 86

    Laberteaux K P, Haas J J, Hu Y C. Security certificate revocation list distribution for vanet. In: Proceedings of the 5th ACM International Workshop on VehiculAr Inter-NETworking, San Francisco, 2008. 88–89

  87. 87

    Amoozadeh M. Certificate revocation list distribution in vehicular communication systems. Dissertation for Master’s Degree. Stockholm: Kungliga Tekniska Högskolan, 2012

  88. 88

    Lin X, Lu R, Zhang C, et al. Security in vehicular ad hoc networks. IEEE Commun Mag, 2008, 46: 88–95

  89. 89

    Papapanagiotou K, Marias G F, Georgiadis P. A certificate validation protocol for VANETS. In: Proceedings of IEEE Globecom Workshops, Washington, 2007. 1–9

  90. 90

    Papapanagiotou K, Marias G, Georgiadis P, et al. Performance evaluation of a distributed ocsp protocol over manets. In: Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, Las Vegas, 2006. 1–5

  91. 91

    Ga˜nán C, Mu˜noz J L, Esparza O, et al. PPREM: privacy preserving revocation mechanism for vehicular ad hoc networks. Comput Stand Interface, 2014, 36: 513–523

  92. 92

    Ga˜nán C, Munoz J L, Esparza O, et al. EPA: an efficient and privacy-aware revocation mechanism for vehicular ad hoc networks. Pervas Mobile Comput, 2015, 21: 75–91

  93. 93

    Studer A, Shi E, Bai F, et al. Tacking together efficient authentication, revocation, and privacy in VANETS. In: Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, 2009. 1–9

  94. 94

    Ruj S, Cavenaghi M A, Huang Z, et al. On data-centric misbehavior detection in VANETS. In: Proceedings of Vehicular Technology Conference (VTC Fall), San Francisco, 2011. 1–5

  95. 95

    Ghosh M, Varghese A, Gupta A, et al. Misbehavior detection scheme with integrated root cause detection in vanet. In: Proceedings of the 6th ACM International Workshop on VehiculAr Inter NET working, Beijing, 2009. 123–124

  96. 96

    Wasef A, Shen X. Edr: efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans Veh Technol, 2009, 58: 5214–5224

Download references

Author information

Correspondence to Yue Cao.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Khan, T., Ahmad, N., Cao, Y. et al. Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey. Sci. China Inf. Sci. 60, 100301 (2017). https://doi.org/10.1007/s11432-017-9203-x

Download citation

Keywords

  • certificate revocation list
  • VANETs
  • Intelligent Transportation System (ITS)
  • Public Key Infrastructure (PKI)
  • Vehicular Public Key Infrastructure (VPKI)