Limits on Revocation in VANETs

نویسندگان

  • Bisheng Liu
  • Jerry T. Chiang
  • Yih-Chun Hu
چکیده

We examine the limitations on revocation approaches in VANETs, including local revocation and global revocation. Local revocation schemes often use a local vote to identify and revoke an attacker. However, such votes often require that not only a majority of local nodes are honest, but that they also are able to detect the attack. We argue that these requirements may not be practical, particularly in the early stage of VANET deployment. Another local revocation approach, RevoGame [1], uses game theory to mitigate misbehavior in the VANET; however, we argue RevoGame does not correctly identify the players in the revocation game. We also analyze the limits of global revocation based on the misbehvaior accusations made and evidence gathered by each vehicle. Our analysis shows that no algorithm that uses only the accusation graph can identify attackers without false positives and false negatives.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Case for Dynamic Key Distribution for PKI-Based VANETs

Vehicular Ad hoc Networks (VANETs) are becoming a reality where secure communication is a prerequisite. Public key infrastructure (PKI) can be used to secure VANETs where an onboard tamper proof device (TPD) stores a number of encryption keys which are renewed upon visiting a certificate authority (CA). We previously proposed a dynamic key distribution protocol for PKI-based VANETs [1] to reduc...

متن کامل

Quick Message Authentication Protocol for Vehicular AD HOC Networks

Public Key Infrastructure (PKI) plays very important role in Vehicular Ad hoc Networks (VANETs). In this system; confirmation of received message can be done by checking the sender’s certificate is included in the Certificate Revocation Lists (CRLs), which means checking its revocation status, then, substantiating the sender’s certificate, and finally validating the sender’s signature. Since th...

متن کامل

Broadcasting Message Authentication Protocol for Vehicular Ad Hoc Networks Using Cluster Technique

It is well recognized that security plays a vital for the trustworthy operation of vehicular ad hoc networks (VANETs). One of the critical sanctuary issues is the revocation of misbehaving vehicles, which is essential for the prevention of malicious vehicles from other vehicles. Vehicular ad hoc networks (VANETs) adopt the Public Key infrastructure (PKI) and Certificate Revocation Lists (CRLs) ...

متن کامل

TREES: Traceable, Revocation-Efficient, and Exculpable Signatures for Vehicular Ad-Hoc Networks

Vehicular Ad-Hoc Networks (VANETs) require advanced cryptographic techniques in order to meet the conflicting requirements of simultaneous user anonymity and accountability. In this paper, we present a novel group signature scheme that meets these requirements. It provides constant-time revocation, much more efficient than what is achieved in existing schemes. It also provides exculpability so ...

متن کامل

TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs (CMU-CyLab-08-011)

Vehicular Ad Hoc Networks (VANETs) require some mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles. A Public Key Infrastructure (PKI) can provide this functionality using certificates and fixed public keys. However, fixed keys allow an eavesdropper to associate a key with a vehicle and a location, violating drivers’ privacy. In this work we examine ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010