Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography

Francisco Martín-Fernández, Pino Caballero-Gil, Cándido Caballero-Gil

Abstract

The management of fraudulent users of vehicular ad-hoc networks is one of the most important security issues of these mobile networks. It is necessary to prevent the access of malicious users to the network so that they cannot send false information to other users. This paper defines a new method for managing revoked users, using identity-based authentication, what allows improving both efficiency and security through certificateless authentication. The presented proposal optimizes the performance of classical revocation lists by building a data structure based on two concepts: an authenticated dynamic hash k-ary tree, and the frequency with which revoked pseudonyms are queried. Thus, revoked pseudonyms that are more frequently queried have a higher level in the tree. This provides a better match to urban environments, where there are some types of vehicles that spend more time on the road due to their work tasks.

References

  1. Blake-Wilso, S. (2000). Information security, mathematics, and public-key cryptography. Designs, Codes and Cryptography 19(2-3), pages 77-99.
  2. Boneh, D. and Franklin, M. (2001). Identity-based encryption from the weil pairing. Crypto. LNCS 2139, pages 213-229.
  3. C. Ganan, J. Munoz, O. E. J. M.-D. and Alins, J. (2012). Toward revocation data handling efficiency in vanets. Communication Technologies for Vehicles, pages 80- 90.
  4. G. Bertoni, J. Daemen, M. P. and Assche, G. (2010). Keccak sponge function family main document. Updated submission to NIST (Round 2), 2.1.
  5. Huffman, D. (1952). A method for the construction of minimum-redundancy codes. Proceedings of IRE 40 (9), pages 1098-1101.
  6. IEEE-1609 (2006). Family of standards for wireless access in vehicular environments (wave). U.S. Department of Transportation.
  7. J. Munoz, J. Forne, O. E. and Manel, J. (2005). Efficient certificate revocation system implementation: Huffman merkle hash tree (huffmht). TrustBus, pages 119-127.
  8. Jakobsson, M. and Wetzel, S. (2004). Efficient attribute authentication with applications to ad hoc networks. ACM workshop on vehicular ad hoc networks, pages 38-46.
  9. Joux, A. (2002). The weil and tate pairings as building blocks for public key cryptosystems. Algorithmic Number Theory Symposium. LNCS 2369, pages 20- 32.
  10. J.P. Hubaux, S. C. and Luo, J. (2004). The security and privacy of smart vehicles. IEEE Security and Privacy 2(3), pages 49-55.
  11. Kocher, P. (1998). On certificate revocation and validation. FC98. LNCS 1465, pages 172-177.
  12. M. Goodrich, R. Tamassia, N. T. and Cohen, R. (2003). Authenticated data structures for graph and geometric searching. CT-RSA. LNCS 2612, pages 295-313.
  13. M. Goodrich, M. Shin, R. T. and Winsborough, W. (2003). Authenticated dictionaries for fresh attribute credentials. Trust Management. LNCS 2692, pages 332-347.
  14. M. Jakobsson, T. Leighton., S. M. and Szydlo, M. (2003). Fractal merkle tree representation and traversal. CTRSA. LNCS 2612, pages 314-326.
  15. Merkle, R. (1980). Protocols for public key cryptosystems. IEEE Security and privacy 1109, pages 122-134.
  16. Miller, V. (1986). Short programs for functions on curves. Unpublished manuscript, 97, pages 101-102.
  17. Raya, M. and Hubaux, J. (2007). Securing vehicular ad hoc networks. Computer Security 15(1), pages 29-68.
  18. Shamir, A. (1985). Identity-based cryptosystems and signature schemes. Crypto. LNCS 196, pages 47-53.
  19. T. Cormen, C. L. and Rivest, R. (1990). Introduction to algorithms. MIT Press.
Download


Paper Citation


in Harvard Style

Martín-Fernández F., Caballero-Gil P. and Caballero-Gil C. (2015). Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography . In Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: WOSIS, (ICEIS 2015) ISBN 978-989-758-097-0, pages 701-708. DOI: 10.5220/0005479207010708


in Bibtex Style

@conference{wosis15,
author={Francisco Martín-Fernández and Pino Caballero-Gil and Cándido Caballero-Gil},
title={Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography},
booktitle={Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: WOSIS, (ICEIS 2015)},
year={2015},
pages={701-708},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005479207010708},
isbn={978-989-758-097-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 17th International Conference on Enterprise Information Systems - Volume 2: WOSIS, (ICEIS 2015)
TI - Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography
SN - 978-989-758-097-0
AU - Martín-Fernández F.
AU - Caballero-Gil P.
AU - Caballero-Gil C.
PY - 2015
SP - 701
EP - 708
DO - 10.5220/0005479207010708