Abstract
This article discusses an effective revocation scheme for disconnected Delay Tolerant Vehicular Ad hoc Networks (VANETs). Malicious vehicles can exhibit various misbehaviour such as dropping packets due to selfish reasons. Selfishness can be due to the need to conserve limited resources such as energy and bandwidth. This forces vehicles to either drop all or some of the packets they receive. This is particularly obtainable in multi-hop forwarding networks where packets are routed from one vehicle to another towards their destination. When some packets are dropped, the usefulness of the system is not fully realised since it affects the quality of information available to vehicles for making driving decisions such as road manoeuvres. Additionally, packet dropping can degrade the routing efficiency of the system. In extreme cases of misbehaviour, it is important to stop such vehicles from further participation in network communication. One way of achieving this is through revocation. However, it is important to establish mechanisms for identifying such vehicles before blacklisting them for revocation. Our objective here is to address the question of how much we can use a trust-based scheme where vehicles cannot always be expected to follow normal protocols for revocation. Revocation or suspension of misbehaving vehicles is essential to avoid havoc and possible economic damage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Djamaludin, C.I., Foo, E., Camtepe, S., Corke, P.: Revocation and update of trust in autonomous delay tolerant networks. J. Comput. Secur. 60, 15–36 (2016). ISSN 0167-4048
Hoeper, K., Gong, G.: Monitoring-based key revocation schemes for mobile ad hoc networks: design and security analysis (2009)
Zhang, J.: A survey on trust management for VANETs. In: Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA 2011), pp. 105–112. IEEE Computer Society, Washington, DC (2011). ISBN 978-0-7695-4337-6
Rongxing, L., Xiaodong, L., Haojin, Z., Xuemin, S., Preiss, B.: Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wirel. Commun. 9(4), 1483–1493 (2010). ISSN 1536-1276
Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, pp. 252–259. ACM, New York (2005). ISBN 1-59593-026-4
Hasan, O., Brunie, L., Bertino, E., Shang, N.: A decentralized privacy preserving reputation protocol for the malicious adversarial mode. IEEE Trans. Inf. Forensics Secur. 8(8), 949–962 (2013). ISSN 1556-6013
Ruj, S., Cavenaghi, M.A., Huang, Z., Nayak, A., Stojmenovic, I.: On data-centric misbehavior detection in VANETs. In: Vehicular Technology Conference (VTC Fall), pp. 1–5. IEEE (2001). ISSN 1090-3038
Golle, P., Greene, D., Staddon, J.: Detecting and Correcting Malicious Data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks (VANET 2004), pp. 29–37. ACM, New York (2004). ISBN 1-58113-922-5
Dotzer, F., Fischer, L., Magiera, P.: VARS: a vehicle ad-hoc network reputation system. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2005), pp. 454–456 (2005)
Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE J. Sel. Areas Commun. 25(8), 1557–1568 (2007). ISSN 0733-8716
Isento, J.N.G., Rodrigues, J., Dias, J., Paula, M.C.G., Vinel, A.: Vehicular delay-tolerant networks: a novel solution for vehicular communications. IEEE Intell. Transp. Syst. Mag. 5(4), 10–19 (2013). ISSN 1939-1390
Timpner, J., Schrmann, D., Wolf, L.: Trustworthy parking communities: helping your neighbor to find a space. IEEE Trans. Dependable Secur. Comput. 13(1), 120–132 (2016). ISSN 1545-5971
Viswanathan, K., Templin, F.: (Internet-Draft) Architecture for a Delay-and-Disruption Tolerant Public-Key Distribution Network (PKDN). Internet Engineering Task Force (2016)
Cao, Y., Wang, N., Kamel, G.: A publish/subscribe communication framework for managing electric vehicle charging. In: 2014 International Conference on Connected Vehicles and Expo (ICCVE), pp. 318–324 (2014). ISSN 2378-1289
Bhutta, M.N.M., Cruickshank, H., Sun, Z.: Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks. In: IET Information Security (IET) (2016)
Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002). doi:10.1007/3-540-45455-1_26
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13
Wasef, A., Shen, X.: EDR: efficient decentralized revocation protocol for vehicular ad hoc networks. IEEE Trans. Veh. Technol. 58(9), 5214–5224 (2009). ISSN 0018-9545
Naor, M., Nissim, K.: Certificate revocation and certificate update. IEEE J. Sel. Areas Commun. 18(18), 561–570 (2000). ISSN 0733-8716
Li, W., Song, H.: ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 960–969 (2016). ISSN 1524-9050
Li, Z., Chigan, C.T.: On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Trans. Mob. Comput. 13(10), 2334–2344 (2014). ISSN 1536-1233
Shafer, G.: Dempster-Shafer theory. In: Encyclopedia of Artificial Intelligence, pp. 330–331. Wiley, Hoboken (1992)
Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Conference on Electronic Commerce, p. 41 (2002)
Tim, L., Elmar, S.: Greedy routing in highway scenarios: the impact of position faking nodes. In: Proceedings of Workshop on Intelligent Transportation (WIT) (2006)
Kim, Y., Lee, J.-J., Helmy, A.: Impact of location inconsistencies on geographic routing in wireless networks. In: Proceedings of the 6th ACM International Workshop on Modelling Analysis and Simulation of Wireless and Mobile Systems, San Diego, pp. 124–127. ACM, New York (2003). ISBN 1-58113-766-4
Kherani, A., Rao, A.: Performance of node-eviction schemes in vehicular networks. IEEE Trans. Veh. Technol. 59(2), 550–558 (2010). ISSN 0018-9545
Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutor. 17(1), 228–255 (2015). ISSN 1553-877X
Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. In: IETF, Network Working Group (2002)
Laberteaux, K.P., Haas, J.J., Hu, Y.-C.: Security certificate revocation list distribution for VANET. In: Proceedings of the Fifth ACM International Workshop on VehiculAr Inter-NETworking, San Francisco, pp. 88–89. ACM, New York (2008). ISBN 978-1-60558-191-0
Nelson, S.C., Bakht, M., Kravets, R.: Encounter-based routing in DTNs. In: IEEE INFOCOM, pp. 846–854 (2009)
Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Efficient routing in intermittently connected mobile networks: the multiple-copy case. IEEE/ACM Trans. Netw. 16(1), 77–90 (2008). ISSN 1063-6692
Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Single-copy routing in intermittently connected mobile networks. In: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks. IEEE SECON 2004, pp. 235–244 (2004)
Raya, M., Jungels, D., Papadimitratos, P., Aad, I., Hubaux, J.-P.: Certificate revocation in vehicular networks. In: Laboratory for Computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland (2006)
Xiaodong, L., Rongxing, L., Chenxi, Z., Haojin, Z., Pin-Han, H., Xuemin, S.: Security in vehicular ad hoc networks. IEEE Commun. Mag. 46(4), 88–95 (2008). ISSN 0163-6804
Acknowledgement
The funding for this work is from the Overseas Scholarship Scheme (OSS) of the Petroleum Technology Development Fund (PTDF) of the Federal Government of Nigeria with support from the PETRAS Project (in conjunction with IoTUK) and the Institute for Communication Systems, home of The 5G Innovation Center (5GIC), University of Surrey, Guildford, United Kingdom.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Anyigor Ogah, C.P., Cruickshank, H., Asuquo, P.M., Lei, A., Sun, Z. (2017). Delay Tolerant Revocation Scheme for Delay Tolerant VANETs (DTRvS). In: Piva, A., Tinnirello, I., Morosi, S. (eds) Digital Communication. Towards a Smart and Secure Future Internet. TIWDC 2017. Communications in Computer and Information Science, vol 766. Springer, Cham. https://doi.org/10.1007/978-3-319-67639-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-67639-5_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67638-8
Online ISBN: 978-3-319-67639-5
eBook Packages: Computer ScienceComputer Science (R0)