REWIRE – Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc Networks

  • David FörsterEmail author
  • Hans Löhr
  • Jan Zibuschka
  • Frank Kargl
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9229)


We propose a novel mechanism for excluding misbehaving participants from a vehicular ad-hoc network (V2X system) that does not require resolution of pseudonyms. Our approach enables a revocation authority to exclude the sender of a given message from pseudonymous communication without resolving (or otherwise learning) his long-term identity. This is achieved by broadcasting (or geocasting) a request for self-revocation to which only the holder of the pseudonym in question will respond by revoking all relevant pseudonyms. Compliance to the request is enforced by a trusted component in each vehicle that ensures the integrity and correct operation of its V2X on-board unit.

With our revocation mechanism the deployment of privacy-friendly pseudonym schemes that do not implement pseudonym resolution becomes practical.


Certificate Authority Trust Platform Module Trust Computing Group Direct Anonymous Attestation Pseudonym Certificate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work was partially funded within the project CONVERGE by the German Federal Ministries of Education and Research as well as Economic Affairs and Energy.


  1. 1.
    WG - Dedicated Short Range Communication Working Group: 1609.0-2013 - IEEE guide for wireless access in vehicular environments (WAVE) - architecture (2013)Google Scholar
  2. 2.
    Bißmeyer, N.: Misbehavior detection and attacker identification in vehicular ad-hoc networks. Ph.D. thesis, TU Darmstadt, Germany, December 2014Google Scholar
  3. 3.
    Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, 25–29 October, 2004, Washington, DC, USA, pp. 132–145. ACM (2004)Google Scholar
  4. 4.
    Bubeck, O., Gramm, J., Ihle, M., Shokrollahi, J., Szerwinski, R., Emele, M.: A hardware security module for engine control units. In: Proceedings of the 10th ESCAR Conference (2011)Google Scholar
  5. 5.
    Calandriello, G., Papadimitratos, P., Hubaux, J.P., Lioy, A.: Efficient and robust pseudonymous authentication in vanet. In: Proceedings of the Fourth ACM International Workshop on Vehicular Ad Hoc Networks, pp. 19–28. ACM (2007)Google Scholar
  6. 6.
    CAR 2 CAR Communication Consortium: Memorandum of understanding on deployment strategy for cooperative ITS in europe, June 2011Google Scholar
  7. 7.
    CONVERGE: Deliverable D4.3 “Architecture of the car2x systems network”, section 4.1.2, January 2015Google Scholar
  8. 8.
    ETSI Technical Committee Intelligent Transport Systems (ITS): Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Definitions. Technical report, 102 638 V1.1.1, European Telecommunications Standards Institute, June 2009Google Scholar
  9. 9.
    ETSI Technical Committee Intelligent Transport Systems (ITS): Intelligent Transport Systems (ITS); Security; Security Services and Architecture. Technical report, TS 102 731 V1.1.1, European Telecommunications Standards Institute, September 2010Google Scholar
  10. 10.
    ETSI Technical Committee Intelligent Transport Systems (ITS): Intelligent Transport Systems (ITS); Cooperative ITS (C-ITS); Release 1. Technical report, 101 607 V1.1.1, European Telecommunications Standards Institute, May 2013Google Scholar
  11. 11.
    Föster, D., Kargl, F., Löhr, H.: PUCA: A pseudonym scheme with user-controlled anonymity for vehicular ad-hoc networks (VANET). In: Proceedings of the IEEE Vehicular Networking Conference 2014 (VNC 2014). IEEE (2014)Google Scholar
  12. 12.
    General Motors: Cadillac to introduce advanced ‘intelligent and connected’ vehicle technologies on select 2017 models, September 2014.
  13. 13.
    Henniger, O., Ruddle, A., Seudié, H., Weyl, B., Wolf, M., Wollinger, T.: Securing vehicular on-board it systems: The EVITA project. In: VDI/VW Automotive Security Conference (2009)Google Scholar
  14. 14.
    Herstellerinitiative Software (HIS): SHE secure hardware extension version 1.1. (2009).
  15. 15.
    Laberteaux, K.P., Haas, J.J., Hu, Y.C.: Security certificate revocation list distribution for vanet. In: Proceedings of the Fifth ACM International Workshop on Vehicular Inter-Networking, VANET 2008, pp. 88–89. ACM (2008)Google Scholar
  16. 16.
    Li, F., Wang, Y.: Routing in vehicular ad hoc networks: a survey. IEEE Veh. Technol. Mag. 2(2), 12–22 (2007)CrossRefGoogle Scholar
  17. 17.
    National Highway Traffic Safety Administration (NHTSA): Federal motor vehicle safety standards: Vehicle-to-vehicle (V2V) communications. Advance notice of proposed rulemaking (ANPRM) (2014).
  18. 18.
    Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A., Hubaux, J.P.: Secure vehicular communication systems: design and architecture. IEEE Commun. Mag. 46(11), 100–109 (2008)CrossRefGoogle Scholar
  19. 19.
    Papadimitratos, P., Buttyan, L., Hubaux, J.P., Kargl, F., Kung, A., Raya, M.: Architecture for secure and private vehicular communications. In: 7th International Conference on ITS Telecommunications, ITST 2007, pp. 1–6. IEEE (2007)Google Scholar
  20. 20.
    Papadimitratos, P., Mezzour, G., Hubaux, J.P.: Certificate revocation list distribution in vehicular communication systems. In: Proceedings of the Fifth ACM International Workshop on Vehicular Inter-Networking, VANET 2008, pp. 86–87. ACM (2008)Google Scholar
  21. 21.
    Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutorials 17(1), 228–255 (2015)CrossRefGoogle Scholar
  22. 22.
    Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Selected Areas Commun. 25(8), 1557–1568 (2007)CrossRefGoogle Scholar
  23. 23.
    Schaub, F., Kargl, F., Ma, Z., Weber, M.: V-tokens for conditional pseudonymity in VANETs. In: Wireless Communications and Networking Conference (WCNC), pp. 1–6. IEEE (2010)Google Scholar
  24. 24.
    Stumpf, F., Fischer, L., Eckert, C.: Trust, security and privacy in VANETs - a multilayered security architecture for C2C-communication. In: VDI BERICHTE 2016, 23. VDI/VW-Gemeinschaftstagung Automotive Security, Wolfsburg, p. 55, November 2007Google Scholar
  25. 25.
    Trusted Computing Group: TCG TPM 2.0 Library profile for automotive thin specification, version 1.0. TCG Specification, 2015.

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • David Förster
    • 1
    Email author
  • Hans Löhr
    • 1
  • Jan Zibuschka
    • 1
  • Frank Kargl
    • 2
    • 3
  1. 1.Robert Bosch GmbH StuttgartGermany
  2. 2.Ulm UniversityUlmGermany
  3. 3.University of Twente EnschedeThe Netherlands

Personalised recommendations