Regional CRL Distribution Based on the LBS for Vehicular Networks

  • HyunGon Kim
  • MinSoo Kim
  • SeokWon Jung
  • JaeHyun Seo
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 240)


To protect the members of the vehicular networks from malicious users and malfunctioning equipments, certificate revocation list (CRL) should be distributed as quickly and efficiently as possible without over-burdening the network. The common theme among existing methods in the literature to reduce distribution time is to reduce the size of the CRL, since smaller files can be distributed more quickly. Our proposal has been concerned with the problem of how to reduce the size of CRL effectively. We propose a regional CRL distribution method that introduces partitioned CRLs corresponding to certificate authority (CA) administrative regions. A regional CRL includes only neighbouring vehicle’s revoked certificates and distributed to vehicles within one CA region. Consequently, since there is no need to process full CRLs by all vehicles, the method can reduce computational overhead, long authentication delay, message signature and verification delay, and processing complexity imposed by full CRL distribution methods.




  1. 1.
    Lin X, Lu R, Zhang C, Zhu H, Ho PH, Shen X (2008) Security in vehicular ad hoc networks. IEEE Commun Mag 46(4):88–95CrossRefGoogle Scholar
  2. 2.
    IEEE Std 1609.2: Trial-Use standard for wireless access in vehicular environments—Security services for applications and management message. IEEE Standard 1609.2 (2006)Google Scholar
  3. 3.
    Wasef A, Shen X (2009) MAAC: Message authentication acceleration protocol for vehicular ad hoc networks. In: Proceedings of the IEEE Globecom 2009, pp 1–6Google Scholar
  4. 4.
    Lin X, Sun X , Ho P-H , Shen X (2007) GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Trans Veh Technol 56: 3442–3456Google Scholar
  5. 5.
    Papadimitratos P, Kung A, Hubaux JP, Kargl F (2006) Privacy and identity management for vehicular communication systems: a position paper. In: Proceedings of workshop on standards for privacy in user-centric identity managementGoogle Scholar
  6. 6.
    Laberteaux KP, Haas JJ, Hu YC (2008) Security certificate revocation list distribution for VANET. In: 15th ACM international workshop on VehiculAr InterNETworing (VANET), pp 88–89Google Scholar
  7. 7.
    Papadimitratos P, Mezzour G, Hubaux JP (2008) Certificate revocation list distribution in vehicular communication systems. In: 15th ACM international workshop on Vehicular InterNETworing (VANET), pp 1–10Google Scholar
  8. 8.
    Kamat P, Baliga A, Trappe W (2006) An identity-based security framework for VANETs. In: Proceedings of the third ACM workshop on vehicular networksGoogle Scholar
  9. 9.
    Raya M, Jungels D, Papadimitratos P, Aad I, Hubaux JP (2006) Certificate revocation in vehicular networks. In: Laboratory for computer communications and applications (LCA) School of Computer and Communication SciencesGoogle Scholar
  10. 10.
    OMA standard (2011) Secure user plan location. V3.0Google Scholar
  11. 11.
    OMA standard (2011) Mobile location protocol. V3.1Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht(Outside the USA) 2013

Authors and Affiliations

  • HyunGon Kim
    • 1
  • MinSoo Kim
    • 1
  • SeokWon Jung
    • 1
  • JaeHyun Seo
    • 1
  1. 1.Department of Information SecurityMokpo National UniversityMuan-GunKorea

Personalised recommendations