Efﬁcient Distributed Admission and Revocation using Blockchain for Cooperative ITS
Links to Fileshttps://ieeexplore.ieee.org/document/8328734/authors
MetadataShow full item record
Type of Work5 pages
conference papers and proceedings
Citation of Original PublicationArticle Titl: Efficient Distributed Admission and Revocation Using Blockchain for Cooperative ITS. Publication Title: 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) ISBN: New-2005_Electronic_978-1-5386-3662-6 Posted Online Date 2 Apr 2018 Authors Noureddine Lasla; Mohamed Younis; Wassim Znaidi; Dhafer Ben Arbia. DOI: 10.1109/NTMS.2018.8328734
RightsThis item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please contact the author.
Cooperative Intelligent Transportation System (C-ITS) enables inter-networking of vehicles for alerts exchanging in order to improve road safety. While this technology is about to enter the market in the upcoming years, critical questions related to the communication security continue to be challenging research concerns. Current solutions to secure inter-vehicle com-munication depend mainly on the use of digital certiﬁcates for authentication. However, such an approach imposes signiﬁcant overhead on vehicles since it is computationally demanding and requires validation of the certiﬁcate within a limited period. In addition, relying on a central node for deciding on issuing and revoking certiﬁcates introduces a single point of failure and could even risk the safety of motorists. In this paper, we propose the use of Blockchain to keep track of the certiﬁcate of each vehicle (valid or revoked) in distributed and immutable records. In essence we replace certiﬁcate veriﬁcation with a lightweight blockchain-based authentication approach. In addition, we pro-pose a fully distributed vehicle admission/revocation scheme. We show that our scheme could alleviate the computation overhead and enhance the response time while improving the overall system security.