Advertisement

Delay Tolerant Revocation Scheme for Delay Tolerant VANETs (DTRvS)

  • Chibueze P. Anyigor OgahEmail author
  • Haitham Cruickshank
  • Philip M. Asuquo
  • Ao Lei
  • Zhili Sun
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 766)

Abstract

This article discusses an effective revocation scheme for disconnected Delay Tolerant Vehicular Ad hoc Networks (VANETs). Malicious vehicles can exhibit various misbehaviour such as dropping packets due to selfish reasons. Selfishness can be due to the need to conserve limited resources such as energy and bandwidth. This forces vehicles to either drop all or some of the packets they receive. This is particularly obtainable in multi-hop forwarding networks where packets are routed from one vehicle to another towards their destination. When some packets are dropped, the usefulness of the system is not fully realised since it affects the quality of information available to vehicles for making driving decisions such as road manoeuvres. Additionally, packet dropping can degrade the routing efficiency of the system. In extreme cases of misbehaviour, it is important to stop such vehicles from further participation in network communication. One way of achieving this is through revocation. However, it is important to establish mechanisms for identifying such vehicles before blacklisting them for revocation. Our objective here is to address the question of how much we can use a trust-based scheme where vehicles cannot always be expected to follow normal protocols for revocation. Revocation or suspension of misbehaving vehicles is essential to avoid havoc and possible economic damage.

Keywords

Revocation Malicious vehicles VANETs Vehicular Delay Tolerant Networks VDTN 

Notes

Acknowledgement

The funding for this work is from the Overseas Scholarship Scheme (OSS) of the Petroleum Technology Development Fund (PTDF) of the Federal Government of Nigeria with support from the PETRAS Project (in conjunction with IoTUK) and the Institute for Communication Systems, home of The 5G Innovation Center (5GIC), University of Surrey, Guildford, United Kingdom.

References

  1. 1.
    Djamaludin, C.I., Foo, E., Camtepe, S., Corke, P.: Revocation and update of trust in autonomous delay tolerant networks. J. Comput. Secur. 60, 15–36 (2016). ISSN 0167-4048CrossRefGoogle Scholar
  2. 2.
    Hoeper, K., Gong, G.: Monitoring-based key revocation schemes for mobile ad hoc networks: design and security analysis (2009)Google Scholar
  3. 3.
    Zhang, J.: A survey on trust management for VANETs. In: Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA 2011), pp. 105–112. IEEE Computer Society, Washington, DC (2011). ISBN 978-0-7695-4337-6Google Scholar
  4. 4.
    Rongxing, L., Xiaodong, L., Haojin, Z., Xuemin, S., Preiss, B.: Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wirel. Commun. 9(4), 1483–1493 (2010). ISSN 1536-1276CrossRefGoogle Scholar
  5. 5.
    Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, pp. 252–259. ACM, New York (2005). ISBN 1-59593-026-4Google Scholar
  6. 6.
    Hasan, O., Brunie, L., Bertino, E., Shang, N.: A decentralized privacy preserving reputation protocol for the malicious adversarial mode. IEEE Trans. Inf. Forensics Secur. 8(8), 949–962 (2013). ISSN 1556-6013CrossRefGoogle Scholar
  7. 7.
    Ruj, S., Cavenaghi, M.A., Huang, Z., Nayak, A., Stojmenovic, I.: On data-centric misbehavior detection in VANETs. In: Vehicular Technology Conference (VTC Fall), pp. 1–5. IEEE (2001). ISSN 1090-3038Google Scholar
  8. 8.
    Golle, P., Greene, D., Staddon, J.: Detecting and Correcting Malicious Data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2004), pp. 29–37. ACM, New York (2004). ISBN 1-58113-922-5Google Scholar
  9. 9.
    Dotzer, F., Fischer, L., Magiera, P.: VARS: a vehicle ad-hoc network reputation system. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2005), pp. 454–456 (2005)Google Scholar
  10. 10.
    Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun. 25(8), 1557–1568 (2007). ISSN 0733-8716CrossRefGoogle Scholar
  11. 11.
    Isento, J.N.G., Rodrigues, J., Dias, J., Paula, M.C.G., Vinel, A.: Vehicular delay-tolerant networks: a novel solution for vehicular communications. IEEE Intell. Transp. Syst. Mag. 5(4), 10–19 (2013). ISSN 1939-1390CrossRefGoogle Scholar
  12. 12.
    Timpner, J., Schrmann, D., Wolf, L.: Trustworthy parking communities: helping your neighbor to find a space. IEEE Trans. Dependable Secur. Comput. 13(1), 120–132 (2016). ISSN 1545-5971CrossRefGoogle Scholar
  13. 13.
    Viswanathan, K., Templin, F.: (Internet-Draft) Architecture for a Delay-and-Disruption Tolerant Public-Key Distribution Network (PKDN). Internet Engineering Task Force (2016)Google Scholar
  14. 14.
    Cao, Y., Wang, N., Kamel, G.: A publish/subscribe communication framework for managing electric vehicle charging. In: 2014 International Conference on Connected Vehicles and Expo (ICCVE), pp. 318–324 (2014). ISSN 2378-1289Google Scholar
  15. 15.
    Bhutta, M.N.M., Cruickshank, H., Sun, Z.: Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks. In: IET Information Security (IET) (2016)Google Scholar
  16. 16.
    Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002). doi: 10.1007/3-540-45455-1_26 CrossRefGoogle Scholar
  17. 17.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi: 10.1007/3-540-44647-8_13 CrossRefGoogle Scholar
  18. 18.
    Wasef, A., Shen, X.: EDR: efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans. Veh. Technol. 58(9), 5214–5224 (2009). ISSN 0018-9545CrossRefGoogle Scholar
  19. 19.
    Naor, M., Nissim, K.: Certificate revocation and certificate update. IEEE J. Sel. Areas Commun. 18(18), 561–570 (2000). ISSN 0733-8716CrossRefGoogle Scholar
  20. 20.
    Li, W., Song, H.: ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 960–969 (2016). ISSN 1524-9050CrossRefGoogle Scholar
  21. 21.
    Li, Z., Chigan, C.T.: On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 13(10), 2334–2344 (2014). ISSN 1536-1233CrossRefGoogle Scholar
  22. 22.
    Shafer, G.: Dempster-Shafer theory. In: Encyclopedia of Artificial Intelligence, pp. 330–331. Wiley, Hoboken (1992)Google Scholar
  23. 23.
    Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Conference on Electronic Commerce, p. 41 (2002)Google Scholar
  24. 24.
    Tim, L., Elmar, S.: Greedy routing in highway scenarios: the impact of position faking nodes. In: Proceedings of Workshop on Intelligent Transportation (WIT) (2006)Google Scholar
  25. 25.
    Kim, Y., Lee, J.-J., Helmy, A.: Impact of location inconsistencies on geographic routing in wireless networks. In: Proceedings of the 6th ACM International Workshop on Modelling Analysis and Simulation of Wireless and Mobile Systems, San Diego, pp. 124–127. ACM, New York (2003). ISBN 1-58113-766-4Google Scholar
  26. 26.
    Kherani, A., Rao, A.: Performance of node-eviction schemes in vehicular networks. IEEE Trans. Veh. Technol. 59(2), 550–558 (2010). ISSN 0018-9545CrossRefGoogle Scholar
  27. 27.
    Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutor. 17(1), 228–255 (2015). ISSN 1553-877XCrossRefGoogle Scholar
  28. 28.
    Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. In: IETF, Network Working Group (2002)Google Scholar
  29. 29.
    Laberteaux, K.P., Haas, J.J., Hu, Y.-C.: Security certificate revocation list distribution for VANET. In: Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking, San Francisco, pp. 88–89. ACM, New York (2008). ISBN 978-1-60558-191-0Google Scholar
  30. 30.
    Nelson, S.C., Bakht, M., Kravets, R.: Encounter-based routing in DTNs. In: IEEE INFOCOM, pp. 846–854 (2009)Google Scholar
  31. 31.
    Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Efficient routing in intermittently connected mobile networks: the multiple-copy case. IEEE/ACM Trans. Netw. 16(1), 77–90 (2008). ISSN 1063-6692CrossRefGoogle Scholar
  32. 32.
    Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Single-copy routing in intermittently connected mobile networks. In: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. IEEE SECON 2004, pp. 235–244 (2004)Google Scholar
  33. 33.
    Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.-P.: Certificate revocation in vehicular networks. In: Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland (2006)Google Scholar
  34. 34.
    Xiaodong, L., Rongxing, L., Chenxi, Z., Haojin, Z., Pin-Han, H., Xuemin, S.: Security in vehicular ad hoc networks. IEEE Commun. Mag. 46(4), 88–95 (2008). ISSN 0163-6804CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Chibueze P. Anyigor Ogah
    • 1
    Email author
  • Haitham Cruickshank
    • 1
  • Philip M. Asuquo
    • 1
  • Ao Lei
    • 1
  • Zhili Sun
    • 1
  1. 1.5G Innovation Centre (5GIC), Institute for Communication SystemsUniversity of SurreyGuildfordUK

Personalised recommendations