Next Article in Journal
Towards Real-Time Analysis of Gas-Liquid Pipe Flow: A Wire-Mesh Sensor for Industrial Applications
Previous Article in Journal
Fiber Optic Sensor of Ammonia Gas Using Plasmonic Extraordinary Optical Transmission
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

IMF-PR: An Improved Morton-Filter-Based Pseudonym-Revocation Scheme in VANETs

Software College, Northeastern University, Shenyang 110819, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(8), 4066; https://doi.org/10.3390/s23084066
Submission received: 14 March 2023 / Revised: 4 April 2023 / Accepted: 12 April 2023 / Published: 18 April 2023
(This article belongs to the Section Sensor Networks)

Abstract

:
Vehicle ad hoc networks (VANETs) are special wireless networks which help vehicles to obtain continuous and stable communication. Pseudonym revocation, as a vital security mechanism, is able to protect legal vehicles in VANETs. However, existing pseudonym-revocation schemes suffer from the issues of low certificate revocation list (CRL) generation and update efficiency, along with high CRL storage and transmission costs. In order to solve the above issues, this paper proposes an improved Morton-filter-based pseudonym-revocation scheme for VANETs (IMF-PR). IMF-PR establishes a new distributed CRL management mechanism to maintain a low CRL distribution transmission delay. In addition, IMF-PR improves the Morton filter to optimize the CRL management mechanism so as to improve CRL generation and update efficiency and reduce the CRL storage overhead. Moreover, CRLs in IMF-PR store illegal vehicle information based on an improved Morton filter data structure to improve the compress ratio and the query efficiency. Performance analysis and simulation experiments showed that IMF-PR can effectively reduce storage by increasing the compression gain and reducing transmission delay. In addition, IMF-PR can also greatly improve the lookup and update throughput on CRLs.

1. Introduction

The intelligent transportation system (ITS) integrates a variety of advanced equipment and technologies and has gradually become an important part of the next generation of urban transportation, providing convenience for drivers and passengers [1]. Vehicular ad hoc networks (VANETs), as the key parts of ITSs, adopt dedicated short-range communication technology (DSRC) and enable rapid interconnection between vehicle-to-vehicle (V2V) and vehicle-to-roadside infrastructure (V2I) to ensure that drivers and passengers have access to continuous and reliable services and applications [2]. In order to preserve vehicle identity privacy, VANETs mandates that vehicles utilize pseudonyms instead of real identities to anonymize identities and regularly change pseudonyms to prevent tracking from adversaries [3]. However, when vehicles are attacked, an effective pseudonym-revocation scheme should be developed to quickly remove illegal vehicles from VANETs [4]. The following two mechanisms are typically adopted in pseudonym-revocation schemes.
(1)
An automatic revocation mechanism [5,6,7]. If an illegal vehicle is identified, the authority only stops issuing new pseudonyms. When the old pseudonym expires, the illegal vehicle will be automatically revoked. An expired automatic revocation mechanism can help the authority to drop the maintenance cost effectively. However, since the legal vehicles are unable to receive the revocation notice timely, the illegal vehicle can continue to misbehave before the old pseudonym expires.
(2)
A certificate revocation list (CRL)-based pseudonym revocation mechanism [8]. By distributing CRLs containing illegal vehicles’ identities, the authority is able to remove illegal vehicles from VANETs in time. According to [9], the CRL is typically distributed under the following three conditions.
  • Key compromise. The vehicle’s private key or certificate is disclosed or damaged.
  • Association change. The information of the vehicle is modified or becomes invalid.
  • Service termination. The usage scenario of the certificate or private key is terminated.
However, the traditional CRL-based pseudonym-revocation schemes still face the following issues [10,11,12,13].
(1)
Low transmission efficiency. Since all pseudonyms and expiration dates of revoked vehicles are stored in CRLs, it is difficult to rapidly disseminate CRLs to vehicles when driving at high speeds.
(2)
Long update period. In order to guarantee communication security, the authority needs to update CRLs regularly. In a CRL-update period, the authority needs to remove the expired illegal vehicles and add new illegal vehicles. According to IEEE Std 1609.2 [8], all illegal vehicles’ information is stored in the entries of CRLs in a linear manner. As a result, when it comes to removing expired pseudonyms, the authority has to go through all the entries. If there are many illegal vehicles in VANETs, the CRL update efficiency will be severely influenced.
(3)
Low query efficiency. Before communicating with other surrounding vehicles v j , the legal vehicle v i first checks whether the pseudonym and expiration date of v j are recorded in CRLs. Due to the linear storage structure of CRLs, v i needs to traverse all entries. In VANETs, such an inefficient query leads to high authentication and communication delay.
(4)
High storage overhead. Since authority must store all records of CRLs, CRLs issued over numerous publishing periods may contain a huge quantity of information about the same illegal vehicle, resulting in the waste of storage. Furthermore, since there is a limited number of vehicles interacting during a CRL life cycle, legal vehicles need to store a great amount of redundant illegal-vehicle information, which causes excessive storage overhead.
In order to solve the above problems, the authors of [14] separated and distributed CRLs to vehicles in the form of data streams to reduce communication costs and CRL distribution delay. However, [14] only focused on CRL distribution efficiency and ignored the optimization of CRL’s data structure. Taking advantage of the low computational cost and high verification efficiency of HMAC, [7,15] replaced the CRL’s linear data structure with a hash table. By regularly updating the hash chain, the authority ensures that legal vehicles can obtain relevant information of illegal vehicles in a timely manner. However, the above two schemes are not able to solve high storage and transmission overhead issues caused by the CRL growth. Ref. [16] adopts a Merkle hash tree (MHT) to optimize CRL data structure. However, the MHT-based cannot support the deletion operation. Moreover, pseudonym validity was verified by obtaining proofs from Roadside Units (RSUs), which imposes huge computational and communication overheads on RSUs. Refs. [17,18] adopted the Bloom filter (BF) to optimize the CRL’s data structure. Likely, the BF-based schemes cannot support the deletion operation as the MHT-based scheme. As a result, the authority must rebuild the CRL before distribution, which leads to low CRL update efficiency. Ref. [19] proposed a pseudonym-revocation scheme based on Cuckoo filter. The scheme supports CRL data-deletion operations with a minimal storage overhead and provides higher data query performance by optimizing the CRL data structure. However, this scheme ignores the maintenance cost of the historical CRLs by authority. As historical CRLs continue to multiply, the storage cost of the authority will increase linearly.
Unlike the Bloom filter (BF), which only supports lookups and insertions but not deletions in its simplest form, the Morton filter (MF) supports lookups, insertions, and deletions. In VANETs, it is necessary to delete expired pseudonyms in CRLs in time to avoid huge overheads caused by CRLs storage and transmission. In addition, MF adopts a compressed block format that permits storing a logically sparse filter compactly in memory. Compared to the stock Cuckoo filter (CF), MFs particularly excel for workloads that use large filters. Due to the large number of vehicles in VANETs, a large number of pseudonyms need to be revoked; therefore, compared with BF and CF, MF is more suitable for VANETs. Moreover, to improve the update efficiency, an improved Morton-filter-based pseudonym-revocation scheme for VANETs (IMF-PR) is proposed in this paper. IMF-PR optimizes the Morton filter to improve the efficiency of CRL generation and query. Meanwhile, in order to reduce the CRL storage overhead and improve CRL distribution efficiency, IMF-PR improves the CRL data structure and implements the distributed CRL management mechanism. To be specific, the main contributions are described as follows.
(1)
Based on the previous research [20], IMF-PR establishes a distributed CRL management mechanism, in which authority is responsible for maintaining CRLs, including long-term pseudonyms of illegal vehicles, and the base station maintains CRLs containing multiple illegal vehicles’ temporary pseudonyms that are valid within the scope of base-station management, so as to reduce the computational overhead of authority on CRLs and the communication overhead of distributing CRLs.
(2)
IMF-PR improved the Morton filter to optimize the CRL management mechanism. Temporary storage space is used to support the dynamic management of illegal vehicles’ information, so as to keep CRL generation and update efficiency and reduce the CRL storage overhead.
(3)
CRLs in IMF-PR store illegal vehicles’ information based on the improved Morton filter’s data structure rather than sequential structure to improve the compression ratio of CRLs and lower the transmission cost of CRLs. Furthermore, the entities owning CRLs can determine whether the surrounding vehicles are legitimate by calculating the fingerprint, which improves the query efficiency.
(4)
The compression gain and transmission delay results demonstrate that, compared with C 2 RL [17] and C 3 RL [19], CRLs in IMF-PR can be more quickly transmitted to the whole VANETs than them. Moreover, the simulation showed that IMF-PR’s query throughput and update throughput are superior to those of C 2 RL [17] and C 3 RL [19] in most cases.

2. Preliminaries

2.1. VANETs

VANETs, as essential parts of ITSs, are able to support the connection between vehicles and infrastructures. In VANETs, a broad range of mobile communication technologies are integrated into roadside units (RSUs) and vehicles to relieve traffic congestion and improve driving safety. As shown in Figure 1, vehicles with onboard units (OBUs) adopt dedicated short range communication (DSRC) to communicate with RSUs or other OBUs and obtain required services [8]. RSUs provide safety-related services, efficiency-related services, entertainment-related services, and so forth, for surrounding vehicles. For example, to guarantee traffic efficiency and safety, RSUs provide road-congestion management and collision alerts for surrounding vehicles [21]. A road-congestion application can provide the best routes for vehicles, and communication occurs among the vehicles and from vehicles to RSUs. This application’s goal is to decrease congestion and improve traffic efficiency. In order to prevent malicious vehicles from obtaining services, it is necessary to verify the validity of pseudonyms of vehicles applying for services. The collision alert’s goal is to avoid and decrease the number of accidents. This is an application category sensitive to the delay. To reduce the delay, road conditions use vehicle-to-vehicle communication. Moreover, the pseudonym’s validation must be as fast as possible to avoid the illegal user from broadcasting a bogus message. Therefore, in both examples, it is necessary to design a pseudonym-revocation scheme with a low distribution delay and an efficient query. The base station (BS) can communicate with the external network and provide network communication services for vehicles. In addition, a BS can assist authorities in providing CRL generation and distribution services for vehicles. In VANETs, two different types of communication are used to support applications and services: (1) vehicle-to-infrastructure (V2I) communication. V2I refers to the communication between vehicles and infrastructures (e.g., RSUs). When entering the signal coverage range of an RSU, vehicles are able to adopt DSRC technology to request an RSU to obtain the required services. An RSU has external network communication capabilities through interconnection with the surrounding BS and provides necessary services for surrounding vehicles. (2) Vehicle-to-vehicle (V2V) communication. V2V refers to the communication between vehicles, which is completed by vehicles independently without the participation of RSUs. Depending on V2V communication, vehicles can obtain the driving status of surrounding vehicles in time to ensure driving safety and improve traffic flow.

2.2. Morton Filter

The Morton filter (MF) [22] is a data structure to support data storage and queries with low spatial complexity and high efficiency. The MF enhances the efficiency of data insertion, querying, and deletion by optimizing a cuckoo filter (CF) [23] and improves space complexity through sparse matrix compression. As shown in Figure 2, the MF takes a block as the basic data unit to store the compressed data. Each block consists of the following three parts.
  • Fingerprint storage array (FSA). FSA is made up of a bucket array. Each bucket contains multiple entries, and each entry stores the n-bit value (called fingerprint) generated from the hash value of each element.
  • Full counter array (FCA). Each slot in FCA is encoded to record the logical structure of the bucket in FSA and tracks the number of fingerprints occupied. FCA facilitates in situ reading and writing of serialized buckets in FSA without materializing the whole logical perspective of related blocks. As a result, FSA does not need to store the empty space in the logical structure.
  • Overflow tracking array (OTA). OTA is composed of a bit vector, which tracks the fingerprint overflow status in the block by setting a bit. The fingerprint can be located by querying the value recorded in OTA.
Figure 2. Morton filter.
Figure 2. Morton filter.
Sensors 23 04066 g002
There are three core algorithms in the MF.
(1)
Lookup:Given a key K and a M F , we first compute the fingerprint F = H F ( K ) of K. Then, we compute x = H 1 ( K ) to determine the bucket index for its bucket and divide x by the buckets per block B to yield the block index b. Next, we calculate l = mod ( x , B ) to get the bucket index. We use F , b , l to check for the presence of K in the bucket. If not, we recompute x = H 2 ( K ) and then continue with the rest of the operation.
(2)
Insert: Given a key K and a M F , we first compute the fingerprint F = H F ( K ) of K. Then, we compute x = H 1 ( K ) to determine the bucket index for its bucket and divide x by the buckets per block B to yield the block index b. Next, we calculate l = mod ( x , B ) to get the bucket index. We use F , b , l to store K in the bucket. If successful, we insert F. Else, we recompute x = H 2 ( K ) , and then continue with the rest of the operation.
(3)
Delete: Similarly to lookup, given a key K and a M F , we first compute the fingerprint F = H F ( K ) of K. Then, we compute x = H 1 ( K ) to determine the bucket index for its bucket and divide x by the buckets per block B to yield the block index b. Next, we calculate l = mod ( x , B ) to get the bucket index. We use F , b , l to check for the presence of K in the bucket. If successful, we delete F. Otherwise, we recompute x = H 2 ( K ) and then continue with the rest of the operation.

3. System Overview

In this section, the IMF-PR system architecture, the improved Morton filter (IMF) data structure, and the IMF-PR-based CRL (IMF-CRL) are elaborated.

3.1. IMF-PR System Architecture

As shown in Figure 3, the IMF-PR system architecture includes four types of entities: TA, BS, RSU, and vehicle.
TA. According to the illegal vehicle’s long-term pseudonym P S τ T A , TA is able to query the real identity of the vehicle and the related long-term pseudonym set { P S i T A } i [ 1 , n ] , encapsulate { P S i T A } i [ 1 , n ] and { E X P i T A } i [ 1 , n ] in C R L T A , and distribute C R L T A to the BS.
BS. When receiving C R L T A from TA, the BS verifies whether C R L T A ’s signature is legal. If C R L T A is legal, the BS queries the temporary pseudonym set { P S i B S } i [ 1 , m ] issued by the BS according to the long-term pseudonym { P S i T A } i [ 1 , n ] . The BS integrates all long-term pseudonyms, temporary pseudonyms, and expiration dates of all illegal vehicles to generate and distribute I M F C R L to all RSUs within the managed range.
RSU. When receiving I M F C R L from the BS, RSU verifies the legitimacy of I M F C R L ’s signature. If I M F C R L is legal, RSU refuses to communicate with the illegal vehicles contained in I M F C R L , then distributes the I M F C R L to all legal vehicles within the communication range;
Vehicle. After receiving I M F C R L from RSU, the legal vehicle verifies I M F C R L . Once the verification is successful, the vehicle refuses to communicate with the illegal vehicles recorded in I M F C R L .

3.2. Improved Morton Filter

The improved Morton filter (IMF) data structure that stores the identity information of illegal vehicles in the BS is shown in Figure 4. Three partitions make up the storage space based on the IMF data structure: CRL generation/storage space, data-sharing space, and temporary storage space. If there are new pseudonyms with expiration dates, they are added to the e L i s t and the p L i s t in the temporary storage space. Then, add the corresponding fingerprints to the f p L i s t in the data-sharing space. Finally, update the < F C A , F S A > , and < d a t e , l i n k C R L > in the CRL generation/storage space, which means that the entire IMF-CRL construction process is complete.
(1)
CRL generation/storage space stores all history and current I M F C R L . Differently from the traditional MF, CRL generation/storage space uses a sequential linked list rather than blocks to record all historical and current CRLs. Each item of CRL is composed of two tuples < d a t e and l i n k C R L > , where d a t e stores the time when l i n k C R L is created and l i n k C R L saves the address of the sequence lists composed of FCA and FSA. FCA encodes the logical structure of each bucket in f p L i s t to store the number of fingerprints (F) in f p L i s t . FSA saves the fingerprints contained in f p L i s t . When the number of entries in a bucket is zero, FSA traverses the entries in the next bucket until all fingerprints stored in f p L i s t are recorded.
(2)
The data-sharing space is responsible for dynamically storing the fingerprints of illegal vehicles that need to be revoked in the newest I M F C R L . Given the pseudonym P S and expiration date E X P of the illegal vehicle, the fingerprint F in the f p L i s t ( b u c k e t [ i ] ) can be determined by computing H 1 ( P S | | E X P ) .
(a)
When there are n fingerprints in b u c k e t [ i ] , store the fingerprint F of pseudonym P S and expiration date E X P in the n + 1 th slot of b u c k e t [ i ] in the sequence;
(b)
When there is no remaining slot in b u c k e t [ i ] , execute H 2 ( P S | | E X P ) to determine the bucket candidate position, and continue to execute (a) or (c);
(c)
When the bucket corresponding to H 2 ( P S | | E X P ) is full, expand the bucket storage space, re-execute H 1 ( P S | | E X P ) , and store fingerprint F in the b u c k e t [ i ] .
(3)
Temporary storage space is composed of two linked lists: e L i s t and p L i s t , which are responsible for maintaining the information of the illegal vehicles corresponding to the latest I M F C R L issued. Each node e N o d e in e L i s t is composed of three triples: < n e x t p n , E X P , and n e x t e n > , where n e x t p n stores the address of the pseudonym linked list p L i s t , E X P is responsible for storing and maintaining the expiration date of illegal vehicles pseudonyms, and n e x t e n points to the next e N o d e in the e L i s t . Each e N o d e is stored in e L i s t in the order of E X P increment. p N o d e is composed of three triples: < n e x t p n , P S , and l i n k f p > , where n e x t p n points to the next p N o d e with the same E X P , P S is the pseudonym of the illegal vehicle, l i n k f p stores the address of fingerprint F stored in the f p L i s t in the data-sharing space.
Figure 4. Improved Morton filter.
Figure 4. Improved Morton filter.
Sensors 23 04066 g004

3.3. IMF-CRL

Figure 5 shows the I M F C R L data structure. I M F C R L substitutes I D T A , identifying the TA’s identity in CRL based on 1609 with I D B S and stores the fingerprints of the illegal vehicles based on IMF data structure instead of the sequence list. The notation and explanations for the I M F C R L are shown in Table 1.

4. The Proposed Scheme

The flow diagram of the proposed scheme is shown in Figure 6. The proposed scheme includes IMF-CRL construction, IMF-CRL distribution, and IMF-CRL resolution. In addition, the IMF-CRL construction includes a data-update algorithm and IMF-CRL generation.

4.1. IMF-CRL Construction

In the CRL generation period, TA follows the WAVE-CRL construction algorithm to load the long-term pseudonyms and expiration date of illegal vehicles into C R L T A , and then sends C R L T A to all BSs in VANETs via the secure channel.
When receiving C R L T A , the BS first queries the temporary pseudonyms and expiration date issued by the BS in accordance with the entries contained in C R L T A . The BS updates e L i s t and p L i s t in the temporary storage space and f p L i s t in the data-sharing space based on the above illegal-vehicle information. Then, given the storage list f p L i s t and current date d a t e , the BS updates CRL generation/storage space and generates I M F C R L . Finally, the BS generates the I M F C R L based on the updated f p L i s t .

4.1.1. Data-Update Algorithm

The data-update algorithm consists of the REPF algorithm (remove the expired pseudonym and fingerprint algorithm) and the INPF algorithm (insert a new pseudonym and fingerprint algorithm).
Algorithm 1 is in charge of deleting the old pseudonyms, expiration dates, and fingerprints of illegal vehicles stored in IMF. As shown in Figure 7, the details of the REPF algorithm follow.
(1)
Query the head node ( e N o d e ) in e L i s t . If the E X P stored in e N o d e is expired, then determine the p L i s t pointed to by n e x t p n . For the l i n k f p stored by each p N o d e in the p L i s t , record the address of the fingerprint F in the p N o d e .
(2)
Delete the fingerprint F mapped in f p L i s t according to l i n k f p , move all fingerprints in the same bucket on the left side of F to the right, and set the leftmost slot to n u l l .
(3)
Update e L i s t and p L i s t by deleting the head node e N o d e and all p N o d e linked to by e N o d e . n e x t p n .
Figure 7. Remove the expired pseudonym and fingerprint algorithm.
Figure 7. Remove the expired pseudonym and fingerprint algorithm.
Sensors 23 04066 g007
Algorithm 1 REPF algorithm.
Input:  e L i s t , f p L i s t , p L i s t , c u r r e n t T i m e
Output:  e L i s t , f p L i s t , p L i s t
1:
e N o d e t o p ( e L i s t )
2:
if  e N o d e . E X P c u r r e n t T i m e   then
3:
     while  e N o d e . n e x t p n is not empty do
4:
          p N o d e t o p ( p L i s t )
5:
          b u c k e t [ x ] [ y ] p N o d e . l i n k f p
6:
         delete f p L i s t [ x ] [ y ]
7:
         if  b u c k e t [ x ] is not empty then
8:
              b u c k e t [ x ] [ y ] b u c k e t [ x ] [ y + 1 ]
9:
         else
10:
           break
11:
       end if
12:
        p L i s t p o p F r o n t ( p L i s t )
13:
   end while
14:
    e L i s t p o p F r o n t ( e L i s t )
15:
else
16:
   break
17:
end if
18:
return  e L i s t , f p L i s t , p L i s t

end function
Algorithm 2 is in charge of storing new illegal vehicles’ pseudonyms, expiration dates, and fingerprints in IMF. As shown in Figure 8, given a new pseudonym P S and expiration date E X P , the BS needs to execute the following operations.
(1)
Determine the p L i s t of the new pseudonym P S by traversing the e N o d e :
(a)
When there exist e N o d e with E X P in the e L i s t , record the n e x t p n of the last p N o d e in the p L i s t pointed to by the n e x t p n in e N o d e as l a s t n e x t p n ;
(b)
When the e L i s t is empty, create a new e N o d e , add E X P to e N o d e , set n e x t e n and n e x t p n to null, and e L i s t points to the new e N o d e . Finally, record the n e x t p n in the e N o d e as l a s t n e x t p n .
(c)
When there is no e N o d e with E X P in e L i s t , create a new e N o d e , add E X P to the e N o d e , and set n e x t p n to n u l l . Add the e N o d e in incremental order ( n e x t e n of the previous node of the e N o d e points to the node, and the n e x t e n of the e N o d e points to the next node) and record the n e x t p n in the e N o d e as l a s t n e x t p n .
(2)
Calculate the fingerprints of P S and E X P : F = H F ( P S | | E X P ) and the address x = H 1 ( P S | | E X P ) (or x = H 2 ( P S | | E X P ) ). Store F in the first slot of the remaining space (e.g., b u c k e t [ x ] [ y ] ) in the b u c k e t [ x ] .
(3)
Create a new p N o d e , add P S in the p N o d e , store < x , y > in the l i n k f p , and set n e x t p n = n u l l (as shown in Algorithm 3 InsertFP algorithm).
(4)
The l a s t n e x t p n stores the address of the new p N o d e .
Algorithm 2 INPF algorithm.
Input:  e L i s t , f p L i s t , p L i s t , P S , E X P
Output:  e L i s t , f p L i s t , p L i s t
1:
if  e L i s t is empty then
2:
    new e N o d e
3:
     e N o d e . n e x t e n , e N o d e . n e x t p n N U L L
4:
     e N o d e ( e N o d e . n e x t e n , E X P , e N o d e . n e x t p n )
5:
     e L i s t p u s h F r o n t ( e L i s t , e N o d e )
6:
     f p L i s t , p l i s t I n s e r t F P ( f p L i s t , p l i s t , P S , E X P )
7:
else
8:
    while traverse e N o d e in e L i s t  do
9:
        if  e N o d e . E X P = E X P  then
10:
           f p L i s t , p l i s t I n s e r t F P ( f p L i s t , p l i s t , P S , E X P )
11:
      else if  e N o d e . E X P > E X P > n e x t e N o d e . E X P  then
12:
          new e N o d e
13:
           e N o d e . n e x t p n N U L L
14:
           e N o d e . n e x t e n e N o d e
15:
           e N o d e . n e x t e n n e x t e N o d e
16:
           e N o d e ( e N o d e . n e x t e n , E X P , e N o d e . n e x t p n )
17:
           e L i s t i n s e r t ( e L i s t , e N o d e )
18:
           f p L i s t , p l i s t I n s e r t F P ( f p L i s t , p l i s t , P S , E X P )
19:
      end if
20:
  end while
21:
end if
22:
return  e L i s t , f p L i s t , p L i s t

end function
Algorithm 3 InsertFP algorithm.
Input:  f p L i s t , p l i s t , P S , E X P
Output:  f p L i s t , p l i s t
1:
new p N o d e
2:
p N o d e . n e x t p n N U L L
3:
x 1 H 1 ( P S | | E X P )
4:
for  y = 0 ; y < e n t r y . l e n g t h ; y + +   do
5:
    if  b u c k e t [ x 1 ] [ y ] N U L L  then
6:
        break
7:
   else
8:
         b u c k e t [ x 1 ] [ y ] F
9:
         p N o d e . l i n k f p < x 1 , y >
10:
       p N o d e ( p N o d e . n e x t p n , P S , p N o d e . l i n k f p )
11:
       p L i s t p u s h B a c k ( p L i s t , p N o d e )
12:
      return  f p L i s t , p l i s t
13:
  end if
14:
end for
15:
x 2 H 2 ( H 1 ( P S | | E X P ) )
16:
for  y = 0 ; y < e n t r y . l e n g t h ; y + +   do
17:
    if  b u c k e t [ x 2 ] [ y ] = = N U L L  then
18:
         b u c k e t [ x 2 ] [ y ] F
19:
         p N o d e . l i n k f p < x 2 , y >
20:
         p N o d e ( p N o d e . n e x t p n , P S , p N o d e . l i n k f p )
21:
         p L i s t p u s h B a c k ( p L i s t , p N o d e )
22:
        return  f p L i s t , p l i s t
23:
    else
24:
        break
25:
    end if
26:
end for

end function

4.1.2. IMF-CRL Generation

Given the fingerprint storage list f p L i s t and current date d a t e , the BS generates I M F C R L as the Morton filter does:
(1)
Create a two-tuple < F C A , F S A > , where the size of F C A is the number of b u c k e t in f p L i s t and the size of F S A is equal to the number of fingerprints in f p L i s t ;
(2)
Traverse f p L i s t and store the fingerprints in F S A in the logical order saved in f p l i s t ;
(3)
Record the number of fingerprints stored in each bucket in the f p L i s t and store the value in the corresponding slot in F C A ;
(4)
Package < F C A , F S A > into I M F C R L .

4.2. IMF-CRL Distribution

Based on the W A V E C R L generation protocol, TA generates and transmits C R L T A to all BSs, which contains the long-term pseudonym set, corresponding to the expiration date set of illegal vehicles, and the s i g n a t u r e . After receiving the C R L T A , the BS first uses the TA’s public key to verify C R L T A . If C R L T A is regarded as legal, the BS queries all temporary pseudonym sets issued by the BS according to the pseudonyms and expiration date stored in C R L T A . Then, the BS generates the certificate revocation list I M F C R L through the IMF-CRL construction algorithm and transmits the I M F C R L to RSUs. Next, the RSU verifies I M F C R L . If I M F C R L is legal, the RSU stores I M F C R L locally and sends I M F C R L to surrounding legal vehicles. Finally, the legal vehicle that has received I M F C R L verifies I M F C R L . If the verification is successful, the vehicle updates the local I M F C R L .

4.3. IMF-CRL Resolution

When legal vehicle v and the RSU receive the request from surrounding vehicles (e.g., v ), vehicle v and the RSU checks whether the fingerprint of vehicle v is recorded in I M F C R L . Given I M F C R L , and the pseudonym P S and expiration date E X P of v , the process of IMF-CRL resolution is as follows:
(1)
Calculate the fingerprint of P S and E X P : F = H F ( P S | | E X P ) ;
(2)
Compute the index of P S and E X P in F C A : x = H 1 ( P S | | E X P ) ;
(3)
By summing the values recorded in F C A [ 0 ] to F C A [ x 1 ] , the offset of F in F S A is derived: o f f = i = 0 i < x F C A [ i ] ;
(4)
Query whether there existing a fingerprint F from F S A [ o f f ] to F S A [ o f f + F C A [ x ] 1 ] :
(a)
If F exists, it proves that v is an illegal vehicle; thus, v and RSU refuse to communicate with vehicle v ;
(b)
If there is no fingerprint F, calculate x = H 2 ( P S | | E X P ) , and continue to execute (3) and (4):
When the query is successful, it proves that vehicle v is an illegal vehicle. Vehicle v and RSU refuse to communicate with vehicle v ;
When the query fails, this proves that the fingerprint of the vehicle v is not recorded in the I M F C R L ; vehicle v and RSU execute the V2V and V2I mutual authentication protocols to verify the validity of vehicle v .

5. Performance Analysis

In this section, IMF-PR, C 2 RL [17], and C 3 RL [19] are compared and analyzed in terms of compression gain and transmission delay. Additionally, the simulation framework Veins was adopted to demonstrate the CRL query throughput and CRL-update throughput.
C 2 RL [17] designed a lightweight online certificate status protocol (TinyOCSP) to save on energy. Then, the C 2 RL integrates CRL compression using Bloom filters with TinyOCSP to further reduce the certificate validation overhead. C 3 RL [19] proposed an improved pseudonym certificate revocation scheme, using a Cuckoo filter for compression. In order to optimize deletion efficiency, C 3 RL [19] designed the concept of the Certificate Expiration List (CEL), which can be implemented with a priority queue. The scheme greatly improves the lookup performance on CRLs and reduces the revocation operation costs through deletion.

5.1. Compression Gain

Compression gain ζ is defined as the ratio of the size of WAVE-CRL to the size of the CRL in IMF-PR, C 2 RL, and C 3 RL. With the same number of illegal vehicles, the larger the ζ , the lower the space complexity, and the shorter the CRL length.
ζ = | W A V E C R L | | c o m p r e s s e d C R L |
According to [8], WAVE-CRL consists of three parts: unsigned CRL ( L h = 24 bytes), entries comprising pseudonym and expiration date (14 bytes for each entry), and signature ( L s = 64 bytes).
In the C 2 RL scheme based on the Bloom filter, given the array length m of the Bloom Filter, the length of C 2 RL is l h + ( m / 8 ) + L S bytes. Given the number of entries is n, the average length of each entry in the Bloom filter is C C 2 R L = m / ( 8 n ) bytes. According to [24], C C 2 R L is defined by the false-positive rate as C C 2 R L = m / n = l n 2 l o g 2 ϵ bits. As a result,
ζ C 2 R L = 88 + 14 n 88 n l n 2 l o g 2 ϵ 8
In the C 3 RL scheme based on the Cuckoo filter, assume there are m buckets in the Cuckoo filter, each bucket is able to hold up to b entries, each entry’s fingerprint length is f, and the number of entries is n. The length of C 3 RL is l h + ( f m b / 8 ) + L S bytes; each entry is on average C C 2 R L = f m b / ( 8 n ) bytes. According to [25], given a loading factor α , C C 3 R L is expressed by false-positive rate as C C 3 R L = m / n = ( 3 l o g 2 ϵ ) / α bits. Consequently,
ζ C 3 R L = 88 + 14 n 88 + ( 3 l o g 2 ϵ ) n 8 α
In IMF-PR, suppose that there are m buckets in the IMF, each bucket holds at most b entries, the fingerprint length of each entry is f, and the number of entries is n. The total length of IMF-PR is l h + ( f l o g 2 b / 8 ) + n f + L S bytes; each entry is on average C I M F P R = ( m l o g 2 ( b + 1 ) + b f ) / ( 8 n ) bytes. According to [22], C I M F P R defines the false-positive rate as C I M F P R = ( l o g 2 5 l o g 2 ϵ ) / 4 α bits. Thus,
ζ I M F P R = 88 + 14 n 88 + ( l o g 2 5 l o g 2 ϵ ) n 32 α
The compression gains of IMF-PR, C 2 RL, and C 3 RL at the same load factor α = 0.5 are shown in Figure 9. When the number of pseudonyms revoked remains constant, the compression gain rises in tandem with the false-positive rate. As a result, in order to achieve a low false-positive rate, a larger storage capacity needs to be required. Simultaneously, as the false-positive rate increases, the compression gains of C 2 RL and IMF-PR rise quickly, and the growth rate gradually becomes flat with the false-positive rates of 0.1 % to 0.2 % . Meanwhile, the overall growth rate of C 3 RL is modest. With the same false-positive rate, IMF-PR guarantees the maximum compression gain. In addition, as the number of entries stored in the CRL grows, the compression gains of the three schemes starts to increase dramatically and level off when the number of entries reaches 400 to 800. Meanwhile, the compression gain of C 3 RL increases the slowest and the growth rate of IMF-PR is the highest. When storing the same amount of entries, IMF-PR can provide higher compression gains and shorter the length of the CRL. When the number of entries is 2000 and the false-positive rate is 0.01, the compression gains of C 2 RL and C 3 RL are 2.5 % and 75.4 % lower than those of IMF-PR, respectively.
Figure 10 shows the compression gains of IMF-PR, C 2 RL, and C 3 RL at the same load factor: α = 0.8. Compared with Figure 9, the compression gain of the IMF-PR is significantly increased, and the high compression gain of CRL can be guaranteed while keeping the false-positive rate low. Since the storage space in C 2 RL has nothing to do with the load factor, the results in Figure 9 and Figure 10 are consistent, whereas the compression gain of C 3 RL shows a rather smooth increase. In comparison to Figure 9, IMF-PR and C 3 R achieved higher compression gain with the same storage entry and load factor, while the compression gain of IMF-PR was significantly accelerated and the compression gain of C 3 RL was relatively slow. When the number of entries was 400 to 800, the compression gain of the three schemes flattened out. When the number of entries was 2000 and the false-positive rate was 0.01, the compression gains of C 2 RL and C 3 RL were 56.7 % and 73.4 % lower than that of IMF-PR, respectively.

5.2. Transmission Delay

The transmission delay (TD) is defined as the time from a CRL being distributed to when it is received [26]. In the CRL distribution protocol, the transmission is relatively stable and the delay is small due to the wired transmission among the authority, BSs, and RSUs. This section only discusses the transmission delay from RSU distributing CRL to the vehicle receiving CRL. The TD is defined as
T D = | W A V E < C R L > | b a n d w i d t h
where | W A V E < C R L > | denotes the data packet size of CRL defined by the WAVE standard. The RSU that receives the CRL needs to layer the data via WSMP, LLC, MAC, and PHY. The RSU then transmits the WAVE-packets to surrounding vehicles via the physical layer. According to the 1069.2 standard [8], given the length of the CRL L C R L , the length of the WAVE-packet is L W S A = L C R L + 121 bytes.
Figure 11 shows the transmission delays of IMF-PR, C 2 RL, and C 3 RL for various bandwidths and entries sizes when α = 0.5, ϵ = 0.1 % . The transmission delays of the three schemes all show a decreasing trend as bandwidth increases. Since the CRL compression gain of the IMF-PR is the highest when storing the same items, it assures that the VANETs can complete the CRL distribution with the lowest communication cost. Therefore, IMF-PR can complete the distribution of the CRL with lower transmission delay than C 2 RL and C 3 RL. When the number of illegal vehicles included in the CRL is 0, the CRLs of the three schemes only contain 121 bytes, so the three schemes can finish the CRL distribution with extremely little transmission delay. As the entries of illegal vehicle stored in the CRL grow, the transmission delays of the three schemes showed an upward trend. C 3 RL had the most obvious upward trend due to having the lowest compression rate. By owning the highest compression rate, IMF-PR distributes the CRL with the least transmission delay and the slowest rise rate. When the number of entries is 2000 and the bandwidth is 10 Mbps, the transmission delay of IMF-PR is 10.3 % and 74.9 % lower than those of C 2 RL and C 3 RL, respectively.

5.3. Simulation

Based on the Veins framework, we conducted simulation experiments on IMF-PR, C 2 RL, and C 3 RL in terms of CRL query throughput, where the traffic map of Tianhe District in Guangzhou was embedded as the simulation scenario (2000 × 2000 m 2 ). The simulation tool we used is the open-source framework Vehicles in Network Simulation (Veins) [27]. Veins implements the IEEE 802.11p protocol in the physical and MAC layers and manages the data transmission between OMNET++ and SUMO through TraCI [28]. The data-transmission rate and transmission power are defined as the default values of 6 Mbps and 20 mW, respectively. Then, we define the simulation time and number of cars as 500 s and 20–200, respectively [3,29]. We adopted the open-source MF-library at Github and the main configuration M o r t o n 3 _ 8 from the Morton filter proposal paper [22], which means a 3-slot bucket with 8-bit fingerprints. The parameters of the simulation are shown in Table 2.

5.3.1. Query Throughput

Query throughput is defined as the number of CRL query operations completed by RSU and vehicle per unit time [30]. The higher the query throughput and the faster the query speed, the quicker the RSU, and the vehicle can determine whether the surrounding vehicle is legal or not.
Figure 12 demonstrates the CRL query throughput of IMF-PR, C 2 RL, and C 3 RL under different load factors, α . Both the number of vehicles in the simulation and the running time of the simulation affect the load factor. As the number of vehicles in the simulation and the simulation time increased, the load factor also increased gradually. As the load factor increased, the throughputs of C 2 RL and C 3 RL remained relatively stable. However, IMF-PR showed a considerable downward trend, while still maintaining a high query throughput. Furthermore, when the load factor is low, IMF-PR can complete query operations faster than C 2 RL and C 3 RL. As can be seen in the figure, when the load factor ranges from zero to one, the query-throughput advantage of IMF-PR over C 3 RL gradually decreases from 62.5 % to 25 % , and compared with C 2 RL, the query-throughput advantage of IMF-PR decreases from 84.4 % to 68.8 % . Moreover, when the load factor is increased from 0 to 0.5, the load factor of IMF-PR decreases by 10.5 % , and when the load factor is increased from 0.5 to 1, the load factor of IMF-PR decreases by 42.8 % . As a result, in order to achieve a high query throughput, more storage capacity is required to achieve a lower load factor.

5.3.2. Update Throughput

Update throughput is defined as the number of CRL update operations performed by an authority per unit of time [30]. The higher the update throughput, the faster the authority can update the CRL. The updating of the CRL includes deleting illegal vehicles with expired pseudonyms or falsely reported vehicle information in the old CRL and inserting new illegal-vehicle information. C 2 RL does not support deletion operations, instead verifying the update throughput by insert operations.
Figure 13 shows the CRL-update throughputs for IMF-PR, C 2 RL, and C 3 RL with a load factor of 0.5. Both the number of vehicles in the simulation and the running time of the simulation affect the number of entries that are inserted and deleted. As the number of vehicles in the simulation and the simulation time increase, the number of entries inserted and deleted also increases gradually. However, the percentage of entries inserted does not increase with the number of vehicles and simulation time. It can be seen in the figure that the throughput of C 2 RL is not affected by the percentage of entries inserted. As the proportion of inserted entries continues to increase, the proportion of deleted entries decreases and the throughput of C 3 RL continues to increase, which means when the pseudonyms used by vehicles in VANETs have a long validity period—that is, C 3 RL does not need to delete expired pseudonyms frequently—so the throughput of C 3 RL is more advantageous. However, in order to protect the privacy of the vehicle, the validity periods of the pseudonyms in VANETs cannot be too long. In IMF-PR, since eList in the temporary storage space needs to be updated during inserting entries, the throughput continues to drop. This is because in IMF-PR, entry insertions can only be done one at a time and entry deletions can be done in batches, so throughput decreases as the proportion of entries inserted increases; in contrast, throughput increases as the percentage of entries deleted increases. As can be seen in Figure 13, IMF-PR’s throughput is lower than C 3 RL’s when the percentage of entries inserted is higher than 70 % . When the insertion percentage is zero, the update throughput of IMF-PR is 37.9 % and 51.7 % higher than those of C 3 RL and C 2 RL, respectively. When the insertion percentage is one, the update throughput of C 3 RL is 20 % higher than that of IMF-PR, and the update throughput of IMF-PR is 30 % higher than that of C 2 RL.

6. Conclusions

In this paper, an improved Morton-filter-based pseudonym-revocation scheme for VANETs (IMF-PR) was proposed to address the issues of high CRL maintenance, distribution, and query costs. By improving the Morton filter, IMF-PR enhances the efficiency of generating and updating CRL, lowers the CRL’s storage cost, and enables legal vehicles to quickly query and verify the surrounding vehicles. Moreover, IMF-PR supports the decentralized CRL management mechanism, which not only reduces the CRL maintenance cost of TA, but also improves CRL distribution efficiency. The performance analysis and simulation results showed that the compression ratio of IMF-PR is better than those of C 2 RL and C 3 RL, and the transmission delay of IMF-PR is 10.3 % and 74.9 % lower than those of C 2 RL and C 3 RL, respectively. In addition, in the worst case, the query throughput of IMF-PR is 25 % and 68.8 % higher than those of C 3 RL and C 2 RL, respectively. Moreover, IMF-PR’s update throughput is better than those of the other two schemes when the percentage of entries inserted is less than 70 % . In the future, we will explore a novel anonymous authentication scheme to support secure V2I and V2V communication.

Author Contributions

Conceptualization, C.Z. and T.G.; Methodology, C.Z., T.G. and X.D.; Software, X.D.; Validation, J.Q.; Formal analysis, C.Z. and X.D.; Writing—original draft, C.Z.; Writing—review & editing, J.Q. and T.G.; Visualization, J.Q.; Funding acquisition, T.G. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by National Natural Science Foundation of China grant number 52130403 and the Fundamental Research Funds for the Central Universities grant number N2017003.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhu, F.; Lv, Y.; Chen, Y.; Wang, X.; Xiong, G.; Wang, F. Parallel Transportation Systems: Toward IoT-Enabled Smart Urban Traffic Control and Management. IEEE Trans. Intell. Transp. Syst. 2020, 21, 4063–4071. [Google Scholar] [CrossRef]
  2. AlMarshoud, M.S.; Al-Bayatti, A.H.; Kiraz, M.S. Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures. Veh. Commun. 2022, 36, 100490. [Google Scholar] [CrossRef]
  3. Boualouache, A.; Senouci, S.; Moussaoui, S. PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks. IEEE Trans. Intell. Transp. Syst. 2020, 21, 3209–3218. [Google Scholar] [CrossRef]
  4. Rabieh, K.; Pan, M.; Han, Z.; Ford, V. SRPV: A Scalable Revocation Scheme for Pseudonyms-Based Vehicular Ad Hoc Networks. In Proceedings of the 2018 IEEE International Conference on Communications, ICC 2018, Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar]
  5. Singh, P.K.; Gowtham, S.N.; S, T.; Nandi, S. CPESP: Cooperative Pseudonym Exchange and Scheme Permutation to preserve location privacy in VANETs. Veh. Commun. 2019, 20, 100183. [Google Scholar] [CrossRef]
  6. Benarous, L.; Kadri, B.; Boudjit, S. Alloyed Pseudonym Change Strategy for Location Privacy in VANETs. In Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, CCNC 2020, Las Vegas, NV, USA, 10–13 January 2020; pp. 1–6. [Google Scholar]
  7. Zhu, X.; Jiang, S.; Wang, L.; Li, H. Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 2014, 63, 907–919. [Google Scholar] [CrossRef]
  8. IEEE Std 1609.2-2016 (Revision of IEEE Std 1609.2-2013); IEEE Standard for Wireless Access in Vehicular Environments–Security Services for Applications and Management Messages. IEEE: Piscataway, NJ, USA, 2016; pp. 1–240. [CrossRef]
  9. Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A. Misbehavior detection and efficient revocation within VANET. J. Inf. Secur. Appl. 2019, 46, 193–209. [Google Scholar] [CrossRef]
  10. Simplicio, M.A., Jr.; Cominetti, E.L.; Patil, H.K.; Ricardini, J.E.; Ferraz, L.T.D.; Silva, M.V.M. Privacy-Preserving Certificate Linkage/Revocation in VANETs Without Linkage Authorities. IEEE Trans. Intell. Transp. Syst. 2021, 22, 3326–3336. [Google Scholar] [CrossRef]
  11. Tesei, A.; Lattuca, D.; Pagano, P.; Luise, M.; Ferreira, J.; Bartolomeu, P.C. A Transparent Distributed Ledger-based Certificate Revocation Scheme for VANETs. arXiv 2020, arXiv:2010.13555. [Google Scholar]
  12. Elloh, Y.A.; Hammi, B.; Serhrouchni, A.; Zeadally, S. A blockchain-based certificate revocation management and status verification system. Comput. Secur. 2021, 104, 102209. [Google Scholar] [CrossRef]
  13. Vijayalakshmi, V.; Sathya, M.; Saranya, S.; Selvaroopini, C. Survey on various mechanisms for secure and efficient VANET communication. In Proceedings of the International Conference on Information Communication & Embedded Systems, Chennai, India, 27–28 February 2014; pp. 1–5. [Google Scholar]
  14. Papadimitratos, P.; Mezzour, G.; Hubaux, J. Certificate revocation list distribution in vehicular communication systems. In Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, VANET 2008, San Francisco, CA, USA, 15 September 2008; pp. 86–87. [Google Scholar]
  15. Wasef, A.; Shen, X. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Mob. Comput. 2013, 12, 78–89. [Google Scholar] [CrossRef]
  16. Gañán, C.; Muñoz, J.L.; Esparza, O.; Mata-Díaz, J.; Alins, J. EPA: An efficient and privacy-aware revocation mechanism for vehicular ad hoc networks. Pervasive Mob. Comput. 2015, 21, 75–91. [Google Scholar] [CrossRef]
  17. Höglund, J.; Furuhed, M.; Raza, S. Lightweight certificate revocation for low-power IoT with end-to-end security. J. Inf. Secur. Appl. 2023, 73, 103424. [Google Scholar] [CrossRef]
  18. Dharmapurikar, S.; Krishnamurthy, P.; Sproull, T.; Lockwood, J. Deep packet inspection using parallel Bloom filters. In Proceedings of the 11th Symposium on High Performance Interconnects, Stanford, CA, USA, 20–22 August 2003; pp. 44–51. [Google Scholar] [CrossRef]
  19. Zhang, H.; Zhang, D.; Chen, H.; Xu, J. Improving Efficiency of Pseudonym Revocation in VANET Using Cuckoo Filter. In Proceedings of the 2020 IEEE 20th International Conference on Communication Technology (ICCT), Nanning, China, 28–31 October 2020. [Google Scholar]
  20. Deng, X.; Gao, T.; Guo, N.; Qi, J.; Zhao, C. PAS: Privacy-Preserving Authentication Scheme Based on SDN for VANETs. Appl. Sci. 2022, 12, 4791. [Google Scholar] [CrossRef]
  21. Cunha, F.; Villas, L.; Boukerche, A.; Maia, G.; Viana, A.; Mini, R.; Loureiro, A. Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Netw. 2016, 44, 90–103. [Google Scholar] [CrossRef]
  22. Breslow, A.D.; Jayasena, N. Morton filters: Fast, compressed sparse cuckoo filters. VLDB J. 2020, 29, 731–754. [Google Scholar] [CrossRef]
  23. Bonomi, F.; Mitzenmacher, M.; Panigrahy, R.; Singh, S.; Varghese, G. An Improved Construction for Counting Bloom Filters. In Proceedings of the Algorithms—ESA 2006, 14th Annual European Symposium, Zurich, Switzerland, 11–13 September 2006; pp. 684–695. [Google Scholar]
  24. Pagh, A.; Pagh, R.; Rao, S.S. An optimal Bloom filter replacement. In Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2005, Vancouver, BC, Canada, 23–25 January 2005; pp. 823–829. [Google Scholar]
  25. Fan, B.; Andersen, D.G.; Kaminsky, M.; Mitzenmacher, M. Cuckoo Filter: Practically Better Than Bloom. In Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, CoNEXT 2014, Sydney, Australia, 2–5 December 2014; pp. 75–88. [Google Scholar]
  26. Al Falasi, H.; Barka, E. Revocation in VANETs: A survey. In Proceedings of the 2011 International Conference on Innovations in Information Technology, Abu Dhabi, United Arab Emirates, 25–27 April 2011; pp. 214–219. [Google Scholar]
  27. Sommer, C.; German, R.; Dressler, F. Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis. IEEE Trans. Mob. Comput. 2011, 10, 3–15. [Google Scholar] [CrossRef]
  28. Wegener, A.; Piorkowski, M.; Raya, M.; Hellbrück, H.; Hubaux, J.P. TraCI: An Interface for Coupling Road Traffic and Network Simulators. In Proceedings of the 11th Communications and Networking Simulation Symposium, Ottawa, ON, Canada, 14–17 April 2018. [Google Scholar]
  29. Rong, Y.; Kang, J.; Huang, X.; Xie, S.; Gjessing, S. MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks. IEEE Trans. Dependable Secur. Comput. 2016, 13, 93–105. [Google Scholar]
  30. Rahman, S.; Kim, G.; Cho, Y.Z.; Khan, A. Positioning of UAVs for throughput maximization in software-defined disaster area UAV communication networks. J. Commun. Netw. 2018, 20, 452–463. [Google Scholar] [CrossRef]
Figure 1. VANET architecture.
Figure 1. VANET architecture.
Sensors 23 04066 g001
Figure 3. IMF-PR system architecture.
Figure 3. IMF-PR system architecture.
Sensors 23 04066 g003
Figure 5. IMF-CRL.
Figure 5. IMF-CRL.
Sensors 23 04066 g005
Figure 6. The flow diagram of the proposed scheme.
Figure 6. The flow diagram of the proposed scheme.
Sensors 23 04066 g006
Figure 8. Insert the new pseudonym and fingerprint algorithm.
Figure 8. Insert the new pseudonym and fingerprint algorithm.
Sensors 23 04066 g008
Figure 9. Compression gain ( α = 0.5).
Figure 9. Compression gain ( α = 0.5).
Sensors 23 04066 g009
Figure 10. Compression gain ( α = 0.8).
Figure 10. Compression gain ( α = 0.8).
Sensors 23 04066 g010
Figure 11. Transmission delay ( α = 0.5, ϵ = 0.1 % ).
Figure 11. Transmission delay ( α = 0.5, ϵ = 0.1 % ).
Sensors 23 04066 g011
Figure 12. Query throughput.
Figure 12. Query throughput.
Sensors 23 04066 g012
Figure 13. Update throughput. ( α = 0.5).
Figure 13. Update throughput. ( α = 0.5).
Sensors 23 04066 g013
Table 1. Notation and explanations for the IMF-CRL.
Table 1. Notation and explanations for the IMF-CRL.
NotationDescription
v e r s i o n The version of CRL, which is set to 1 by default.
C R L   s e r i e s The CRL serial number, indicating whether the CRL is associated with a specific certificate.
I D B S BS’s identity.
i s s u e   d a t e The issuance time of I M F C R L .
n e x t   C R L Next issuance time of I M F C R L with the same C R L   s e r i e s .
p r i o r i t y I n f o Assist legal vehicles with insufficient storage space to identify information that needs to be retained or discarded.
C R L   s e r i a l Counter, the value is incremented by 1 when a full I M F C R L or incremental I M F C R L is issued.
e n t r i e s The vehicles’ fingerprints information.
s i g n a t u r e CRL’s signature.
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterValues
Hardware platformCPU: 2.6 GHz Intel(R) Core(TM) i7-6700HQ, 2 GB RAM
Operating systemDebian 9.4
Traffic generatorSUMO
Network simulatorOMNET++
Simulatorveins
Simulation area2000 × 2000 (m 2 )
Data Transmission Rate6 Mbps
Transmission Power20 mW
Simulation time500 s
Number of vehicles20–200
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, C.; Qi, J.; Gao, T.; Deng, X. IMF-PR: An Improved Morton-Filter-Based Pseudonym-Revocation Scheme in VANETs. Sensors 2023, 23, 4066. https://doi.org/10.3390/s23084066

AMA Style

Zhao C, Qi J, Gao T, Deng X. IMF-PR: An Improved Morton-Filter-Based Pseudonym-Revocation Scheme in VANETs. Sensors. 2023; 23(8):4066. https://doi.org/10.3390/s23084066

Chicago/Turabian Style

Zhao, Cong, Jiayu Qi, Tianhan Gao, and Xinyang Deng. 2023. "IMF-PR: An Improved Morton-Filter-Based Pseudonym-Revocation Scheme in VANETs" Sensors 23, no. 8: 4066. https://doi.org/10.3390/s23084066

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop