Using query frequencies in tree-based revocation for certificateless authentication in VANETs

08/06/2022
by   Pino Caballero-Gil, et al.
0

Revocation of dishonest users is not an easy problem. This paper proposes a new way to manage revocation of pseudonyms in vehicular ad-hoc networks when using identity-based authentication to increase efficiency and security through certificateless authentication. In order to improve the performance of revocation lists, this paper proposes the use of a data structure based on authenticated dynamic hash k-ary trees and the frequency with which revoked pseudonyms are consulted. The use of the knowledge about the frequency of consultation of revoked pseudonyms allows an easier access to the most popular revoked pseudonyms to the detriment of revoked pseudonyms that are the least consulted. Accordingly, the proposal is especially useful in urban environments where there are vehicles that spend more time on road than others, such as public service vehicles.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/23/2022

Revocation management in vehicular ad-hoc networks

This paper describes a solution for the efficient management of revocati...
research
08/24/2019

Adaptive Group-based Zero Knowledge Proof-Authentication Protocol (AGZKP-AP) in Vehicular Ad Hoc Networks

Vehicular Ad Hoc Networks (VANETs) are a particular subclass of mobile a...
research
08/11/2022

Poster: Revocation in VANETs Based on k-ary Huffman Trees

One of the biggest problems of vehicular ad-hoc networks is revocation. ...
research
05/13/2020

Cooperative Monitoring and Dissemination of Urban Events Supported by Dynamic Clustering of Vehicles

Critical urban events take places at a random way and they need to be de...
research
10/15/2018

A Low Overhead Cooperative-based Authentication Protocol for VANETs

Vehicular ad-hoc networks (VANETs) have been proposed to automate transp...
research
08/14/2022

Aggregation and probabilistic verification for data authentication in VANETs

Vehicular ad-hoc networks, where traffic information is distributed from...
research
09/23/2022

Authentication and encryption for a robotic ad hoc network using identity-based cryptography

In some situations the communications of a place can be affected, totall...

Please sign up or login with your details

Forgot password? Click here to reset