Skip to main content

Delay Tolerant Revocation Scheme for Delay Tolerant VANETs (DTRvS)

  • Conference paper
  • First Online:
Digital Communication. Towards a Smart and Secure Future Internet (TIWDC 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 766))

Included in the following conference series:

Abstract

This article discusses an effective revocation scheme for disconnected Delay Tolerant Vehicular Ad hoc Networks (VANETs). Malicious vehicles can exhibit various misbehaviour such as dropping packets due to selfish reasons. Selfishness can be due to the need to conserve limited resources such as energy and bandwidth. This forces vehicles to either drop all or some of the packets they receive. This is particularly obtainable in multi-hop forwarding networks where packets are routed from one vehicle to another towards their destination. When some packets are dropped, the usefulness of the system is not fully realised since it affects the quality of information available to vehicles for making driving decisions such as road manoeuvres. Additionally, packet dropping can degrade the routing efficiency of the system. In extreme cases of misbehaviour, it is important to stop such vehicles from further participation in network communication. One way of achieving this is through revocation. However, it is important to establish mechanisms for identifying such vehicles before blacklisting them for revocation. Our objective here is to address the question of how much we can use a trust-based scheme where vehicles cannot always be expected to follow normal protocols for revocation. Revocation or suspension of misbehaving vehicles is essential to avoid havoc and possible economic damage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Djamaludin, C.I., Foo, E., Camtepe, S., Corke, P.: Revocation and update of trust in autonomous delay tolerant networks. J. Comput. Secur. 60, 15–36 (2016). ISSN 0167-4048

    Article  Google Scholar 

  2. Hoeper, K., Gong, G.: Monitoring-based key revocation schemes for mobile ad hoc networks: design and security analysis (2009)

    Google Scholar 

  3. Zhang, J.: A survey on trust management for VANETs. In: Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA 2011), pp. 105–112. IEEE Computer Society, Washington, DC (2011). ISBN 978-0-7695-4337-6

    Google Scholar 

  4. Rongxing, L., Xiaodong, L., Haojin, Z., Xuemin, S., Preiss, B.: Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wirel. Commun. 9(4), 1483–1493 (2010). ISSN 1536-1276

    Article  Google Scholar 

  5. Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, pp. 252–259. ACM, New York (2005). ISBN 1-59593-026-4

    Google Scholar 

  6. Hasan, O., Brunie, L., Bertino, E., Shang, N.: A decentralized privacy preserving reputation protocol for the malicious adversarial mode. IEEE Trans. Inf. Forensics Secur. 8(8), 949–962 (2013). ISSN 1556-6013

    Article  Google Scholar 

  7. Ruj, S., Cavenaghi, M.A., Huang, Z., Nayak, A., Stojmenovic, I.: On data-centric misbehavior detection in VANETs. In: Vehicular Technology Conference (VTC Fall), pp. 1–5. IEEE (2001). ISSN 1090-3038

    Google Scholar 

  8. Golle, P., Greene, D., Staddon, J.: Detecting and Correcting Malicious Data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2004), pp. 29–37. ACM, New York (2004). ISBN 1-58113-922-5

    Google Scholar 

  9. Dotzer, F., Fischer, L., Magiera, P.: VARS: a vehicle ad-hoc network reputation system. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2005), pp. 454–456 (2005)

    Google Scholar 

  10. Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun. 25(8), 1557–1568 (2007). ISSN 0733-8716

    Article  Google Scholar 

  11. Isento, J.N.G., Rodrigues, J., Dias, J., Paula, M.C.G., Vinel, A.: Vehicular delay-tolerant networks: a novel solution for vehicular communications. IEEE Intell. Transp. Syst. Mag. 5(4), 10–19 (2013). ISSN 1939-1390

    Article  Google Scholar 

  12. Timpner, J., Schrmann, D., Wolf, L.: Trustworthy parking communities: helping your neighbor to find a space. IEEE Trans. Dependable Secur. Comput. 13(1), 120–132 (2016). ISSN 1545-5971

    Article  Google Scholar 

  13. Viswanathan, K., Templin, F.: (Internet-Draft) Architecture for a Delay-and-Disruption Tolerant Public-Key Distribution Network (PKDN). Internet Engineering Task Force (2016)

    Google Scholar 

  14. Cao, Y., Wang, N., Kamel, G.: A publish/subscribe communication framework for managing electric vehicle charging. In: 2014 International Conference on Connected Vehicles and Expo (ICCVE), pp. 318–324 (2014). ISSN 2378-1289

    Google Scholar 

  15. Bhutta, M.N.M., Cruickshank, H., Sun, Z.: Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks. In: IET Information Security (IET) (2016)

    Google Scholar 

  16. Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002). doi:10.1007/3-540-45455-1_26

    Chapter  Google Scholar 

  17. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  18. Wasef, A., Shen, X.: EDR: efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans. Veh. Technol. 58(9), 5214–5224 (2009). ISSN 0018-9545

    Article  Google Scholar 

  19. Naor, M., Nissim, K.: Certificate revocation and certificate update. IEEE J. Sel. Areas Commun. 18(18), 561–570 (2000). ISSN 0733-8716

    Article  Google Scholar 

  20. Li, W., Song, H.: ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 960–969 (2016). ISSN 1524-9050

    Article  Google Scholar 

  21. Li, Z., Chigan, C.T.: On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 13(10), 2334–2344 (2014). ISSN 1536-1233

    Article  Google Scholar 

  22. Shafer, G.: Dempster-Shafer theory. In: Encyclopedia of Artificial Intelligence, pp. 330–331. Wiley, Hoboken (1992)

    Google Scholar 

  23. Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Conference on Electronic Commerce, p. 41 (2002)

    Google Scholar 

  24. Tim, L., Elmar, S.: Greedy routing in highway scenarios: the impact of position faking nodes. In: Proceedings of Workshop on Intelligent Transportation (WIT) (2006)

    Google Scholar 

  25. Kim, Y., Lee, J.-J., Helmy, A.: Impact of location inconsistencies on geographic routing in wireless networks. In: Proceedings of the 6th ACM International Workshop on Modelling Analysis and Simulation of Wireless and Mobile Systems, San Diego, pp. 124–127. ACM, New York (2003). ISBN 1-58113-766-4

    Google Scholar 

  26. Kherani, A., Rao, A.: Performance of node-eviction schemes in vehicular networks. IEEE Trans. Veh. Technol. 59(2), 550–558 (2010). ISSN 0018-9545

    Article  Google Scholar 

  27. Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutor. 17(1), 228–255 (2015). ISSN 1553-877X

    Article  Google Scholar 

  28. Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. In: IETF, Network Working Group (2002)

    Google Scholar 

  29. Laberteaux, K.P., Haas, J.J., Hu, Y.-C.: Security certificate revocation list distribution for VANET. In: Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking, San Francisco, pp. 88–89. ACM, New York (2008). ISBN 978-1-60558-191-0

    Google Scholar 

  30. Nelson, S.C., Bakht, M., Kravets, R.: Encounter-based routing in DTNs. In: IEEE INFOCOM, pp. 846–854 (2009)

    Google Scholar 

  31. Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Efficient routing in intermittently connected mobile networks: the multiple-copy case. IEEE/ACM Trans. Netw. 16(1), 77–90 (2008). ISSN 1063-6692

    Article  Google Scholar 

  32. Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Single-copy routing in intermittently connected mobile networks. In: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. IEEE SECON 2004, pp. 235–244 (2004)

    Google Scholar 

  33. Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.-P.: Certificate revocation in vehicular networks. In: Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland (2006)

    Google Scholar 

  34. Xiaodong, L., Rongxing, L., Chenxi, Z., Haojin, Z., Pin-Han, H., Xuemin, S.: Security in vehicular ad hoc networks. IEEE Commun. Mag. 46(4), 88–95 (2008). ISSN 0163-6804

    Article  Google Scholar 

Download references

Acknowledgement

The funding for this work is from the Overseas Scholarship Scheme (OSS) of the Petroleum Technology Development Fund (PTDF) of the Federal Government of Nigeria with support from the PETRAS Project (in conjunction with IoTUK) and the Institute for Communication Systems, home of The 5G Innovation Center (5GIC), University of Surrey, Guildford, United Kingdom.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chibueze P. Anyigor Ogah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Anyigor Ogah, C.P., Cruickshank, H., Asuquo, P.M., Lei, A., Sun, Z. (2017). Delay Tolerant Revocation Scheme for Delay Tolerant VANETs (DTRvS). In: Piva, A., Tinnirello, I., Morosi, S. (eds) Digital Communication. Towards a Smart and Secure Future Internet. TIWDC 2017. Communications in Computer and Information Science, vol 766. Springer, Cham. https://doi.org/10.1007/978-3-319-67639-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67639-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67638-8

  • Online ISBN: 978-3-319-67639-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics