Corpus ID: 10526369

Limits on Revocation in VANETs

@inproceedings{Liu2010LimitsOR,
  title={Limits on Revocation in VANETs},
  author={Bisheng Liu and Jerry T. Chiang and Yih-Chun Hu},
  year={2010}
}
We examine the limitations on revocation approaches in VANETs, including local revocation and global revocation. Local revocation schemes often use a local vote to identify and revoke an attacker. However, such votes often require that not only a majority of local nodes are honest, but that they also are able to detect the attack. We argue that these requirements may not be practical, particularly in the early stage of VANET deployment. Another local revocation approach, RevoGame [1], uses game… Expand

Figures from this paper

Global revocation for the intersection collision warning safety application
  • J. Haas
  • Computer Science
  • VANET@MOBICOM
  • 2012
TLDR
Modifications to the intersection collision warning (ICW) SA are proposed that enable a certificate authority to be offline and yet to decide to revoke a vehicle's certificates using retransmitted information that cannot repudiated. Expand
Revocation Protocol for Group Signatures in VANETs: A Secure Construction
TLDR
This paper addresses the problem of revocation issues associated with group signature-based schemes in VANETs by constructing a revocation protocol that can securely and efficiently solve the issue of revocation in group signature schemes. Expand
Towards Secure Localized Certificate Revocation in Mobile Ad-Hoc Networks
TLDR
This paper focuses on improving the localized certificate revocation scheme proposed by Arboit et al. for mobile ad-hoc networks and demonstrates that the solution reduces the number of accusations required to reliably revoke a certificate. Expand
On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET
TLDR
This thesis points out several limitations of reputation trust management schemes for VANET, and proposes a solution to overcome the problem of information cascading and oversampling, which commonly arise in social networks. Expand
Misbehavior Detection in Ephemeral Networks: A Local Voting Game in Presence of Uncertainty
TLDR
A plain Bayesian game between a benign node and a target node in one stage of a local voting-based scheme is proposed in order to capture uncertainties of nodes for target node identification and how the aforementioned uncertainties and the designed incentives impact the strategies of the players and, consequently, the correct target-node identification is shown. Expand
Misbehavior detection and attacker identification in vehicular ad hoc networks
TLDR
This dissertation demonstrates that the processing of fake information may affect the safety and efficiency of the overall traffic in the attackers' single or multi-hop communication range and proposes new methods and frameworks to evaluate the behavior of VANET nodes based on cooperatively exchanged location-related information. Expand
On Data-Centric Misbehavior Detection in VANETs
TLDR
The concept of data-centric misbehavior detection is introduced and proposed algorithms which detect false alert messages and misbehaving nodes by observing their actions after sending out the alert messages, making the MDS resilient to Sybil attacks. Expand
Vanet Security and Privacy – An Overview
TLDR
A detailed overview of the state-of-the-art security and privacy requirements in VANET is provided and a brief of the approaches that are proposed in the literature to fulfill these requirements is given. Expand
Fox-Hole Model for Data-centric Misbehaviour Detection in VANETs
  • S. Harit, G. Singh, N. Tyagi
  • Computer Science
  • 2012 Third International Conference on Computer and Communication Technology
  • 2012
TLDR
This paper presents a simple scheme for detection of correctness of information regarding happening of an event like a road crash, which uses the data collected from the movement of other vehicles on the road who can observe the event and measuring their response towards it. Expand
Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems
TLDR
This survey derives and discusses a classification for misbehavior detection mechanisms, provides an in-depth overview of seminal papers on the topic, and highlights open issues and possible future research trends. Expand
...
1
2
...

References

SHOWING 1-10 OF 31 REFERENCES
New Strategies for Revocation in Ad-Hoc Networks
TLDR
An even more radical strategy is considered - suicide attacks - in which a node on perceiving another node to be misbehaving simply declares both of them to be dead, and other nodes thereafter ignore them both. Expand
Revocation games in ephemeral networks
TLDR
This paper defines a game-theoretic model to analyze the various local revocation strategies and establishes and proves the conditions leading to subgame-perfect equilibria, and derives the optimal parameters for voting-based schemes. Expand
Design and analysis of a lightweight certificate revocation mechanism for VANET
In this paper, we propose a lightweight mechanism for revoking security certificates appropriate for the limited bandwidth and hardware cost constraints of a VANET. A Certificate Authority (CA)Expand
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
TLDR
This paper proposes protocols, as components of a framework, for the identification and local containment of misbehaving or faulty nodes, and then for their eviction from the system, and shows that the distributed approach to contain nodes and contribute to their eviction is efficiently feasible and achieves a sufficient level of robustness. Expand
Security certificate revocation list distribution for vanet
TLDR
This work proposes a method for car-to-car epidemic distribution of certificate revocation lists which is quick and efficient and significantly outperforms methods that only employ road side unit distribution points. Expand
A localized certificate revocation scheme for mobile ad hoc networks
TLDR
A decentralized certificate revocation scheme that allows the nodes within a MANET to revoke the certificates of malicious entities is presented, which is fully contained and it does not rely on inputs from centralized or external entities. Expand
STRONG VANET SECURITY ON A BUDGET
This article proposes a security authentication process that is well-suited for Vehicular Ad-hoc Networks (VANET). As compared to current Public Key Infrastructure (PKI) proposals for VANETExpand
Fast Exclusion of Errant Devices from Vehicular Networks
TLDR
This work describes two ways of using LEAVE, an existing protocol which allows devices to vote by exchanging signed claims of impropriety, and Stinger, a new protocol where a device unilaterally removes a misbehaving neighbor by agreeing to limit its own participation, and outlines a combined protocol that balances the security and performance characteristics of both strategies. Expand
Certificate revocation list distribution in vehicular communication systems
TLDR
This paper proposes a flexible, simple, and scalable design that leverages on road-side VC infrastructure that can distribute large CRLs across wide VC regions within minutes, by utilizing a bandwidth of only a few Kbps at each road- side infrastructure unit. Expand
On the distribution and revocation of cryptographic keys in sensor networks
TLDR
An overview of key-distribution methods in sensor networks and their salient features are presented to provide context for understanding key and node revocation and define basic properties that distributed sensor-node revocation protocols must satisfy. Expand
...
1
2
3
4
...