{"title":"在 V2X 通信中使用分组方法高效分发 CRL","authors":"Sasuke Nishikawa;Kenya Sato","doi":"10.23919/comex.2024XBL0006","DOIUrl":null,"url":null,"abstract":"In the realm of V2X (Vehicle to Everything) communication research, privacy is upheld through the use of pseudonym technology. However, employing pseudonyms necessitates the distribution of Certificate Revocation Lists (CRLs), posing challenges as the CRL size grows with the increase in invalidated pseudonyms, congesting communication bandwidth. To address this, our proposed method distributes CRLs exclusively to a lead vehicle, tasked with validating pseudonyms for nearby vehicles. Simulation results demonstrate the efficacy of our approach, reducing communication traffic and maintaining delays below 100ms. The proposed technique effectively mitigates the challenges associated with pseudonym-based CRL distribution in V2X communication.","PeriodicalId":54101,"journal":{"name":"IEICE Communications Express","volume":"13 4","pages":"134-137"},"PeriodicalIF":0.3000,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10439040","citationCount":"0","resultStr":"{\"title\":\"Efficient Distribution of CRL with Grouping Method in V2X Communication\",\"authors\":\"Sasuke Nishikawa;Kenya Sato\",\"doi\":\"10.23919/comex.2024XBL0006\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the realm of V2X (Vehicle to Everything) communication research, privacy is upheld through the use of pseudonym technology. However, employing pseudonyms necessitates the distribution of Certificate Revocation Lists (CRLs), posing challenges as the CRL size grows with the increase in invalidated pseudonyms, congesting communication bandwidth. To address this, our proposed method distributes CRLs exclusively to a lead vehicle, tasked with validating pseudonyms for nearby vehicles. Simulation results demonstrate the efficacy of our approach, reducing communication traffic and maintaining delays below 100ms. The proposed technique effectively mitigates the challenges associated with pseudonym-based CRL distribution in V2X communication.\",\"PeriodicalId\":54101,\"journal\":{\"name\":\"IEICE Communications Express\",\"volume\":\"13 4\",\"pages\":\"134-137\"},\"PeriodicalIF\":0.3000,\"publicationDate\":\"2024-02-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10439040\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEICE Communications Express\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10439040/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEICE Communications Express","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10439040/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Efficient Distribution of CRL with Grouping Method in V2X Communication
In the realm of V2X (Vehicle to Everything) communication research, privacy is upheld through the use of pseudonym technology. However, employing pseudonyms necessitates the distribution of Certificate Revocation Lists (CRLs), posing challenges as the CRL size grows with the increase in invalidated pseudonyms, congesting communication bandwidth. To address this, our proposed method distributes CRLs exclusively to a lead vehicle, tasked with validating pseudonyms for nearby vehicles. Simulation results demonstrate the efficacy of our approach, reducing communication traffic and maintaining delays below 100ms. The proposed technique effectively mitigates the challenges associated with pseudonym-based CRL distribution in V2X communication.