I. Introduction
Public key cryptography is used to secure communications in Vehicular Networks (VNs). It guarantees message authentication, integrity and non-repudiation with digital signatures. The private key is used to generate a digital signature whereas the public key is used for verifying the digital signature. If the hash value of the message matches the hash value of the received signature after decryption, it proves that the message is not altered (integrity property) and that the message was created by a known sender such that the sender cannot deny having send the message (authentication and nonrepudiation property). However, since the public keys are published publicly, it has the problem ascertaining if a public key truly belongs to the purported owner. An attacker can create a private/public key pair and then announces it to the entire network that the public key he publishes belongs to another user, for example, Bob. Therefore, when other nodes sends confidential messages encrypted using Bob's public key, the attacker decrypts and reads the message instead. To solve this issue related to the ownership of public key, Public Key Infrastructure (PKI) is used. In North America, the IEEE Wireless Access in Vehicular Environments (WAVE) standard [1] describes the IEEE standard 1609.2 [2] that specifies that a PKI to be employed to secure WAVE messages. In Europe, European Telecommunications Standards Institutes group for Intelligent Transport Systems (ETSI ITS G5) establishes the ETSI TS 102 940 standard [3] that mandates the use of a PKI for secure communication.