International Conference on Computer Aided Systems Theory

Computer Aided Systems Theory – EUROCAST 2015 pp 57-63 | Cite as

Managing Certificate Revocation in VANETs Using Hash Trees and Query Frequencies

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9520)


Due to the proliferation of technology in different areas of daily life, many new types of communication networks are emerging. Among the most interesting wireless networks, Vehicular Ad-hoc Networks are remarkable because road safety and traffic efficiency are two advances that any developed society should undertake. Therefore, research on such networks should evolve to take the final step and move from theory to reality. However, first, it is necessary to improve many aspects related to security. In particular, identification and management of malicious users within the network are major research issues. The traditional method using revocation lists to manage these users becomes very inefficient when the network grows. This paper proposes an alternative method to efficiently manage malicious users, which uses hash trees and query frequencies in order to fit better with the needs of Vehicular Ad-hoc Networks.


Certificate Authority Malicious User Huffman Code Cryptographic Hash Function Query Frequency 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320–337. Springer, Heidelberg (2012) CrossRefGoogle Scholar
  2. 2.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document version 2.1, Updated submission to NIST (Round 2) (2010)Google Scholar
  3. 3.
    Cooper, D.A.: A model of certificate revocation. In: Proceedings of the 15th Annual Computer Security Applications Conference (1999)Google Scholar
  4. 4.
    Cooper, D.A.: A more efficient use of delta CRLs. In: Proceedings of the IEEE Symposium on Security and Privacy (2000)Google Scholar
  5. 5.
    Gañán, C., Muñoz, J.L., Esparza, O., Mata-Díaz, J., Alins, J.: Toward revocation data handling efficiency in VANETs. In: Vinel, A., Mehmood, R., Berbineau, M., Garcia, C.R., Huang, C.-M., Chilamkurti, N. (eds.) Nets4Trains 2012 and Nets4Cars 2012. LNCS, vol. 7266, pp. 80–90. Springer, Heidelberg (2012) CrossRefGoogle Scholar
  6. 6.
    Huffman, D.: A method for the construction of minimum-redundancy codes. Proc. IRE 40(9), 1098–1101 (1952)CrossRefMATHGoogle Scholar
  7. 7.
    Jakobsson, M., Wetzel, S.: Efficient attribute authentication with applications to Ad Hoc networks. In: ACM Workshop on Vehicular Ad Hoc Networks, pp. 38–46 (2004)Google Scholar
  8. 8.
    McMichael, A.J.: The urban environment and health in a world of increasing globalization: issues for developing countries. Bull. World Health Organ. 78(9), 1117–1126 (2000)Google Scholar
  9. 9.
    Muñoz, J.L., Forné, J., Esparza, O., Rey, M.: Efficient certificate revocation system implementation: huffman merkle hash tree (HuffMHT). In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 119–127. Springer, Heidelberg (2005) CrossRefGoogle Scholar
  10. 10.
    Papapanagiotou, K., Marias, G.F., Georgiadis, P.: A certificate validation protocol for VANETs. In: Globecom Workshops IEEE, pp. 1–9 (2007)Google Scholar
  11. 11.
    Serna Olvera, J., Casola, V., Rak, M., Luna, J., Medina, M., Mazzocca, N.: Performance analysis of an OCSP-Based authentication protocol for VANETs. Int. J. Adapt. Resilient and Auton. Syst. (IJARAS) 3(1), 19–45 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer EngineeringUniversity of La LagunaSanta Cruz de TenerifeSpain

Personalised recommendations