2011
DOI: 10.1109/jsac.2011.110309
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Certificate Revocation List Organization and Distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
77
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 96 publications
(77 citation statements)
references
References 10 publications
0
77
0
Order By: Relevance
“…Failure to receive a heartbeat message (or a series of messages so as to allow possible limited connectivity) can act as indication for potential misbehaviour that can also trigger revocation by the TC. In order to improve the safety level provided, this mechanism can make use of the types of heartbeat messages already provided for monitoring the status of one-hop vehicular topologies so as to produce indistinguishable communications and diminish the revocation vulnerability window existing in conventional CRLs [11].…”
Section: B Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Failure to receive a heartbeat message (or a series of messages so as to allow possible limited connectivity) can act as indication for potential misbehaviour that can also trigger revocation by the TC. In order to improve the safety level provided, this mechanism can make use of the types of heartbeat messages already provided for monitoring the status of one-hop vehicular topologies so as to produce indistinguishable communications and diminish the revocation vulnerability window existing in conventional CRLs [11].…”
Section: B Security Analysismentioning
confidence: 99%
“…In this case, information about the revocation of a vehicle's longterm credentials, is disseminated to other participants through Certificate Revocation Lists (CRLs) or other means. Besides being computationally intensive (i.e., the use of CRLs also assumes enhanced connectivity so that all vehicles can periodically retrieve any updated lists [11]), this is harmful to the protection of their privacy [12].…”
Section: Introductionmentioning
confidence: 99%
“…if a vehicle is revoked then all the PNs or public and private key pairs assigned to that vehicle have to be revoked [3], [4] and added to a Revocation List (RL). Therefore, if a single vehicle is revoked then there might be several thousand entries added to the list [13]. This growing RL can cause serious problems at the RSU when verifying hundreds or thousands of messages every 300 ms (as dictated by VSC [10]).…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, each vehicle in the network will own many temporary certificates (also called pseudonyms) to protect the users' privacy. Consequently, these lists will require hundreds of Megabytes [12,21,35]. However, distributing and updating CRLs to all vehicles raises a challenge.…”
Section: Introductionmentioning
confidence: 99%
“…They divided the CRL into several self-verifiable parts and strongly reduced its size by using Bloom filters. Authors in [12] also propose the use of Bloom filters to store the revoked certificates for increasing the search speed in the CRL. On the other hand, authors in [22] proposed to use regional CAs and short lived certificates to decrease the number of entries in the CRL.…”
Section: Introductionmentioning
confidence: 99%