Effective Certificate Distribution in ETSI ITS VANETs Using Implicit and Explicit Requests

  • Sebastian BittlEmail author
  • Berke Aydinli
  • Karsten Roscher
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9066)


Security and privacy of current Car-to-X systems heavily depends on the usage of pseudonym certificates. These carry the required information for authenticating messages received from other vehicles. However, only a limited amount of detailed studies about certificate distribution strategies in VANETs as well as attack surfaces of such systems has been proposed. Therefore, a general study about possible distribution mechanisms and their parametrization is provided in this work. Thereby, the management of entries in request lists is identified as a key issue for system performance. Additionally, a design flaw in the currently standardized ETSI ITS distribution scheme is outlined leading to the possibility of an attacker significantly increasing channel load on the safety critical control channel. A solution to this problem is suggested and an evaluation of its performance is provided. Furthermore, the evaluation shows the great influence of request list management on authentication delay and thus on security inducted packet loss.


Certificate distribution VANET ETSI ITS security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Memorandum of Understanding for OEMs within the CAR 2 CAR Communication Consortium on Deployment Strategy for cooperative ITS in Europe (June 2011)Google Scholar
  2. 2.
    Draft Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages, P1609.2, D12 (January 2012)Google Scholar
  3. 3.
    Intelligent Transport Systems (ITS); STDMA recommended parameters and settings for cooperative ITS; Access Layer Part (2012)Google Scholar
  4. 4.
    Intelligent Transport Systems (ITS); Security; Security header and certificate formats (2013)Google Scholar
  5. 5.
    Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service (August 2013)Google Scholar
  6. 6.
    Behrisch, M., Bieker, L., Erdmann, J., Krajzewicz, D.: SUMO - Simulation of Urban MObility: An Overview. In: SIMUL (2011)Google Scholar
  7. 7.
    Bittl, S., Gonzalez, A.A., Heidrich, W.: Performance Comparision of Encoding Schemes for ETSI ITS C2X Communication Systems. In: VEHICULAR, pp. 58–63 (June 2014)Google Scholar
  8. 8.
    Cheng, L., Henty, B.E., Bai, F., Stancil, D.D.: Highway and Rural Propagation Channel Modeling for Vehicle-to-Vehicle Communications at 5.9 GHz. In: IEEE Antennas and Propagation Society International Symposium, pp. 1–4 (July 2008)Google Scholar
  9. 9.
    Feiri, M., Petit, J., Kargl, F.: Evaluation of Congestion-based Certificate Omission in VANETs. In: IEEE VNC, pp. 101–108 (November 2012)Google Scholar
  10. 10.
    Feiri, M., Petit, J., Schmidt, R., Kargl, F.: The Impact of Security on Cooperative Awareness in VANET. In: IEEE VNC, pp. 127–134 (December 2013)Google Scholar
  11. 11.
    Harding, J., et al.: Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application. Tech. Rep. DOT HS 812 014, Washington, DC: National Highway Traffic Safty Administration (August 2014)Google Scholar
  12. 12.
    Kargl, F., Schoch, E., Wiedersheim, B., Leinmüller, T.: Secure and Efficient Beaconing for Vehicular Networks. In: ACM VAINET, pp. 82–83 (2008)Google Scholar
  13. 13.
    Kloiber, B., Strang, T., de Ponte-Mueller, F., et al.: An Approach for Performance Analysis of ETSI ITS-G5A MAC for Safety Applications. In: ITST (November 2010)Google Scholar
  14. 14.
    Riley, G.F., Henderson, T.R.: The ns-3 Network Simulator. In: Modeling and Tools for Network Simulation, pp. 15–34 (2010)Google Scholar
  15. 15.
    Roscher, K., Bittl, S., Gonzalez, A.A., et al.: ezCar2X: Rapid-Prototyping of Communication Technologies and Cooperative ITS Applications on Real Targets and Inside Simulation Environments. In: 11th Conference WCI (October 2014)Google Scholar
  16. 16.
    Schoch, E., Kargl, F.: On the Efficientcy of Secure Beaconing in VANETs. In: ACM WiSec, pp. 111–116 (2010)Google Scholar
  17. 17.
    Schütze, T.: Automotive Security: Cryptography for Car2X Communication. In: Embedded World Conference (March 2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Sebastian Bittl
    • 1
    Email author
  • Berke Aydinli
    • 1
  • Karsten Roscher
    • 1
  1. 1.Fraunhofer ESKMunichGermany

Personalised recommendations