SDRP: a secure distributed revocation protocol for vehicular environments

被引:3
作者
Chaib, Noureddine [1 ]
Lagraa, Nasreddine [1 ,3 ]
Yagoubi, Mohamed Bachir [1 ]
Lakas, Abderrahmane [2 ]
机构
[1] Univ Laghouat, Lab Informat & Math, BP 37 G,Route Ghardaia, Laghouat, Algeria
[2] Coll Informat Technol, POB 17551, Al Ain, U Arab Emirates
[3] Univ Ottawa, PARADISE Res Lab, Ottawa, ON, Canada
关键词
VANET; distributed revocation; secure routing;
D O I
10.1002/sec.561
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure routing protocols that are based only on cryptographic techniques cannot guarantee security against all attacks. Among solutions that have been proposed to enhance the security in vehicular networks are the distributed revocation protocols, which provide vehicles with the ability to quickly detect and avoid malicious attacks. However, most of the proposed revocation protocols are vulnerable to colluding attacks conducted by malicious nodes, a situation which results in denial of service. In this work, we propose a new and robust distributed revocation protocol for vehicular ad hoc networks, called Secure Distributed Revocation Protocol (SDRP), with the main objective to exclude misbehaving nodes conducting or not a colluding attack from the routing operation in VANET. We present an evaluation analysis of SDRP on the basis of the simulation results and show that our scheme provides a high detection rate of misbehaving nodes with a low rate of false positives even in the presence of a large number of attackers. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:279 / 289
页数:11
相关论文
共 35 条
[1]  
[Anonymous], 2004, A survey of inter-vehicle communication
[2]  
[Anonymous], IEEE ACM WORKSH MOB
[3]   A localized certificate revocation scheme for mobile ad hoc networks [J].
Arboit, Genevieve ;
Crepeau, Claude ;
Davis, Carlton R. ;
Maheswaran, Muthucumaru .
AD HOC NETWORKS, 2008, 6 (01) :17-31
[4]   On the survivability of routing protocols in ad hoc wireless networks [J].
Awerbuch, B ;
Curtmola, R ;
Holmer, D ;
Rubens, H ;
Nita-Rotaru, C .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :327-338
[5]  
Buchegger S, 2002, LECT NOTES INFORM
[6]   Stimulating cooperation in self-organizing mobile ad hoc networks [J].
Buttyán, L ;
Hubaux, JP .
MOBILE NETWORKS & APPLICATIONS, 2003, 8 (05) :579-592
[7]   On the distribution and revocation of cryptographic keys in sensor networks [J].
Chan, HW ;
Gligor, VD ;
Perrig, A ;
Muralidharan, G .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2005, 2 (03) :233-247
[8]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[9]  
Chen, 2007, INT J MULTIMEDIA UBI, V2, P521
[10]   Suicide for the common good: A new strategy for credential revocation in self-organizing systems [J].
Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom .
Oper Syst Rev ACM, 2006, 3 (18-21) :18-21