Advertisement

Autonomous Certification with List-Based Revocation for Secure V2V Communication

  • Anup Kumar Bhattacharya
  • Abhijit Das
  • Dipanwita Roychoudhury
  • Aravind Iyer
  • Debojyoti Bhattacharya
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7671)

Abstract

Privacy and authenticity are two essential security attributes of secure Vehicle-to-Vehicle communications. Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes. In Pseudonymous PKI, a user needs certificates or pseudonyms periodically from the Certificate Authority (CA) to authenticate messages anonymously. But the infrastructure presence to communicate with the CA may not be ubiquitous, at least in the initial development phases of vehicular communication. Another proposal, PKI+ reduces dependence on the CA by allowing users to generate pseudonyms autonomously. However, user revocation in PKI+ is rather inconvenient, since it requires the entire network of non-revoked users to be reconfigured after each such event. In this paper, we propose PKI++, an improvement over PKI+, which brings together the desirable features of PKI and PKI+, namely autonomous certification and list-based revocation. We compare the proposed algorithm with PKI and PKI+, and show revocation to be less costly in PKI++.

Keywords

Authentication Privacy VANET Revocation PKI PKI+ 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Armknecht, F., Festag, A., Westhoff, D., Zeng, K.: Cross-layer privacy enhancement and non-repudiation in vehicular communication. In: Proceedings of the 4th Workshop on Mobile Ad-Hoc Networks, WMAN, Bern, Switzerland (March 2007)Google Scholar
  2. 2.
    Beuchat, J.-L., López-Trejo, E., Martínez-Ramos, L., Mitsunari, S., Rodríguez-Henríquez, F.: Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 413–432. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  3. 3.
    Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: On the performance of secure vehicular communication systems. IEEE Transactions on Dependable and Secure Computing 8, 898–912 (2011)CrossRefGoogle Scholar
  4. 4.
    Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in VANET. In: Vehicular Ad Hoc Networks, VANET 2007, pp. 19–28 (September 2007)Google Scholar
  5. 5.
    Camenisch, J., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)Google Scholar
  6. 6.
    Fan, C.-I., Hsu, R.-H., Tseng, C.-H.: Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks. In: International Conference on Mobile Technology, Applications, and Systems, Mobility 2008, pp. 82:1–82:7. ACM (2008)Google Scholar
  7. 7.
    IEEE. IEEE trial-use standard for wireless access in vehicular environments - security services for applications and managemnet messages (July 2006), http://ieeexplore.ieee.org/xpl/standardstoc.jsp?isnumber=34648
  8. 8.
    Kamat, P., Baliga, A., Trappe, W.: An identity-based framework for VANETs. In: Third ACM International Workshop on Vehicular Ad Hoc Networks, VANET 2006, Los Angeles, California, USA (September 2006)Google Scholar
  9. 9.
    Laberteaux, K.P., Hu, Y.-C., Haas, J.J.: Security Certificate Revocation List Distribution for VANET. In: Proceedings of ACM Mobicom International Workshop on Vehicular Ad Hoc Networks, VANET, pp. 88–89. ACM (September 2008)Google Scholar
  10. 10.
    Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Workshop on Hot Topics in Networks, HotNets-IV (2005)Google Scholar
  11. 11.
    Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.-P.: Certificate revocation in vehicular networks. Tech. report (2006)Google Scholar
  12. 12.
    Ren, W., Ren, K., Lou, W., Zhang, Y.: Efficient User Revocation for Privacy-aware PKI. In: Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness ICST, pp. 1–7 (2008)Google Scholar
  13. 13.
    Studer, A., Shi, E., Bai, F., Perrig, A.: Tacking together Efficient Authentication, Revocation, and Privacy in VANETs. In: Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, SECON 2009 (2009)Google Scholar
  14. 14.
    Weerasinghe, H., Fu, H.: ESAP: Efficient and scalable authentication protocol with conditional privacy for secure vehicular communications. In: 2010 IEEE GLOBECOM Workshops, pp. 1729–1734 (2010)Google Scholar
  15. 15.
    Zeng, K.: Pseudonymous PKI for Ubiquitous Computing. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 207–222. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Anup Kumar Bhattacharya
    • 1
  • Abhijit Das
    • 1
  • Dipanwita Roychoudhury
    • 1
  • Aravind Iyer
    • 2
  • Debojyoti Bhattacharya
    • 2
  1. 1.Department of Computer Science and EngineeringIndian Institute of TechnologyKharagpurIndia
  2. 2.India Science LabGeneral Motors Technical Centre IndiaBangaloreIndia

Personalised recommendations