Javascript must be enabled to continue!
Efficient Revocation of Malicious Vehicles in VANETs
View through CrossRef
Intelligent Transport Systems (ITS) leverage cutting edge technology to enhance the reliability, protection and effectiveness of transportation. Dedicated Short Range Communication (DSRC) is the mean by which Vehicular Ad Hoc Networks (VANETs) provide connectivity among vehicles in form of vehicles to vehicle (V2V) and vehicle to roadside infrastructure (V2I). Maintaining safe connections in VANETs is a major issue due to malicious behavior of unlawful vehicles. Therefore, in order to protect VANETs, malicious vehicles should be revoked, for this purpose Certificate Revocation List (CRL) is distributed by the authorities among the VANETs users. However, due to the passage of time CRL size increased and becomes large, which produces delays in checking and verification of messages and results in disruption. Therefore, dissemination, updating, and searchable processes of traditional CRL techniques face latency and scalability problems. This paper aims to overcome these challenges by eliminating dependency on CRLs, introducing efficient revocation verification, and enabling a self-sufficient revocation mechanism. A novel ERMV approach is proposed, in which Bad-Hash is applied only to pseudonym certificates of revoked vehicles, which facilitates onboard, independent certificate status verification without the need to distribute, obtain or check CRLs. The proposed technique ensures rapid certificate status verification with minimal computational and communication overheads. The results show that the proposed technique can verify over 900 messages in a 300millisecond time frame, which illustrates that the proposed technique can work efficiently in sparse and dense scenarios with less computational and communication overheads.
Title: Efficient Revocation of Malicious Vehicles in VANETs
Description:
Intelligent Transport Systems (ITS) leverage cutting edge technology to enhance the reliability, protection and effectiveness of transportation.
Dedicated Short Range Communication (DSRC) is the mean by which Vehicular Ad Hoc Networks (VANETs) provide connectivity among vehicles in form of vehicles to vehicle (V2V) and vehicle to roadside infrastructure (V2I).
Maintaining safe connections in VANETs is a major issue due to malicious behavior of unlawful vehicles.
Therefore, in order to protect VANETs, malicious vehicles should be revoked, for this purpose Certificate Revocation List (CRL) is distributed by the authorities among the VANETs users.
However, due to the passage of time CRL size increased and becomes large, which produces delays in checking and verification of messages and results in disruption.
Therefore, dissemination, updating, and searchable processes of traditional CRL techniques face latency and scalability problems.
This paper aims to overcome these challenges by eliminating dependency on CRLs, introducing efficient revocation verification, and enabling a self-sufficient revocation mechanism.
A novel ERMV approach is proposed, in which Bad-Hash is applied only to pseudonym certificates of revoked vehicles, which facilitates onboard, independent certificate status verification without the need to distribute, obtain or check CRLs.
The proposed technique ensures rapid certificate status verification with minimal computational and communication overheads.
The results show that the proposed technique can verify over 900 messages in a 300millisecond time frame, which illustrates that the proposed technique can work efficiently in sparse and dense scenarios with less computational and communication overheads.
Related Results
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Status and solutions of malicious complaints
Status and solutions of malicious complaints
In Korea, malicious complaints that go beyond common sense are continuously occurring. Considering that Korea is a leading country in terms of security, the serious level of malici...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints
An efficient scheme to support direct revocation in cloud computing using CPABE: The approach with less time constraints
Secure Data sharing is a major issue of concern in cloud computing. CPABE is well known encryption technique for dealing with the problem of data security over network. Most of the...
Load Aware Traffic Congestion Control Mechanism Using Fuzzy Logic
Load Aware Traffic Congestion Control Mechanism Using Fuzzy Logic
Recently, vehicular networks (VANETs) have emerged as promising technology for enabling communication between vehicles and infrastructures to
improve road safety and driving experi...
A Lightweight Blockchain-Enabled Trust Management Model for Secure Vehicular Communication
A Lightweight Blockchain-Enabled Trust Management Model for Secure Vehicular Communication
Vehicular Ad Hoc Networks (VANETs) are emerging as a pivotal component in intelligent transportation systems, offering safety-critical and comfort-related in...
Discourse on the direction of amendment of the creditor’s right to revoke system
Discourse on the direction of amendment of the creditor’s right to revoke system
In this paper, I propose a general direction on how to design a new creditor's right to revoke in preparation for the Ministry of Justice's future work on the revision of the Civil...

