EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks

被引:49
作者
Wasef, Albert [1 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Ctr Wireless Commun, Waterloo, ON N2L 3G1, Canada
关键词
Ad hoc; decentralized; revocation protocol; vehicular networks;
D O I
10.1109/TVT.2009.2023662
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is well recognized that security is vital for the reliable operation of vehicular ad hoc networks (VANETs). One of the critical security issues is the revocation of misbehaving vehicles, which is essential for the prevention of malicious vehicles from jeopardizing the safety of other vehicles. In this paper, we propose an efficient decentralized revocation (EDR) protocol based on a novel pairing-based threshold scheme and a probabilistic key distribution technique. Because of the decentralized nature of the EDR protocol, it enables a group of legitimate vehicles to perform fast revocation of a nearby misbehaving vehicle. Consequently, the EDR protocol improves the safety levels in VANETs as it diminishes the revocation vulnerability window existing in conventional certificate revocation lists (CRLs). By conducting detailed performance evaluation, the EDR protocol is demonstrated to be reliable, efficient, and scalable.
引用
收藏
页码:5214 / 5224
页数:11
相关论文
共 34 条
[1]  
[Anonymous], 2005, Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'05
[2]  
[Anonymous], 2006, IEEE STD 16092 2006, DOI DOI 10.1109/IEEESTD.2006
[3]  
[Anonymous], NETWORK SIMULATOR NS
[4]  
[Anonymous], P IEEE INT WORKSH VE
[5]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
[8]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[9]  
Choi J.Y., 2005, The 1st ACM international workshop on Quality of service security in wireless and mobile networks, P79
[10]  
Dötzer F, 2006, LECT NOTES COMPUT SC, V3856, P197