Design and Implementation of Certificate Revocation List Acquisition Method for Security of Vehicular Communications 


Vol. 37,  No. 7, pp. 584-591, Jul.  2012


PDF
  Abstract

Distributing a Certificate Revocation List (CRL) quickly to all vehicles in the system requires a very large number of road side units (RSUs) to be deployed. In reality, initial deployment stage of vehicle networks would be characterized by limited infrastructure as a result in very limited vehicle to infrastructure communication. However, every vehicle wants the most recent CRLs to protect itself from malicious users and malfunctioning equipments, as well as to increase the overall security of the vehicle networks. To address this challenge, we design and implement a nomadic device based CRL acquisition method using nomadic device’s communication capability with cellular networks. When a vehicle could not directly communicate with nearby RSUs, the nomadic device acts as a security mediator to perform vehicle’s security functions continuously through cellular networks. Therefore, even if RSUs are not deployed or sparsely deployed, vehicle’s security threats could be minimized by receiving the most recent CRLs in a reasonable time.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

H. G. Kim, "Design and Implementation of Certificate Revocation List Acquisition Method for Security of Vehicular Communications," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 7, pp. 584-591, 2012. DOI: .

[ACM Style]

Hyun Gon Kim. 2012. Design and Implementation of Certificate Revocation List Acquisition Method for Security of Vehicular Communications. The Journal of Korean Institute of Communications and Information Sciences, 37, 7, (2012), 584-591. DOI: .

[KICS Style]

Hyun Gon Kim, "Design and Implementation of Certificate Revocation List Acquisition Method for Security of Vehicular Communications," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 7, pp. 584-591, 7. 2012.