skip to main content
10.1145/1080793acmconferencesBook PagePublication PagesmobicomConference Proceedingsconference-collections
WiSe '05: Proceedings of the 4th ACM workshop on Wireless security
ACM2005 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WiSE05: 2005 ACM Workshop on Wireless Security ( co-located with Mobicom 2005 Conference ) Cologne Germany 2 September 2005
ISBN:
978-1-59593-142-9
Published:
02 September 2005
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 03 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

Welcome to the fourth ACM Workshop on Wireless Security (WiSe). This workshop is being organized with the goal of providing a forum for the exciting research in the increasingly important area of wireless security. We also hope that this workshop will bring together wireless networking and security research communities. Such interactions are expected to increase the number and quality of wireless security research.The workshop received 66 paper submissions, and we thank all the authors for submitting their work to the workshop. Ten submissions were accepted as regular papers which will be presented in the paper sessions at the workshop. We have two excellent invited talks in the workshop, one by Prof. Jean-Pierre Hubaux on "The security of vehicular networks," and by Prof. Virgil Gligor on "Emergent properties in ad-hoc networks: a security perspective." Due to the time limitations of a one-day workshop, many interesting submissions could not be accepted as regular papers. The program committee, therefore, recommended some of the submissions for inclusion in a poster session. The poster session at the workshop will include three such presentations. We have an excellent program, and we believe that you will enjoy attending both the paper and poster presentations.

Skip Table Of Content Section
SESSION: Key management
Article
Efficient key establishment for group-based wireless sensor deployments

Establishing pairwise keys for each pair of neighboring sensors is the first concern in securing communication in sensor networks. This task is challenging because resources are limited. Several random key predistribution schemes have been proposed, but ...

Article
Group-based key pre-distribution in wireless sensor networks

Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have proposed to take advantage of sensors' expected locations to help pre-...

Article
Fully self-organized peer-to-peer key management for mobile ad hoc networks

Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs is more challenging than in conventional networks due to the lack of central ...

Article
The security of vehicular networks

Vehicular networks are likely to become the most relevant form of mobile ad hoc networks (see e.g. http://ivc.epfl.ch). In this talk, we address the security of these networks, a topic that has been (surprisingly) overlooked by the research community. ...

SESSION: Misbehavior
Article
A framework for MAC protocol misbehavior detection in wireless networks

The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main reasons for the growing interest in the issue of compliance to protocol ...

Article
Hotspot-based traceback for mobile ad hoc networks

Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions such as trustworthy routers and static route topology that do not hold in ...

Article
Emergent properties in ad-hoc networks: a security perspective

A common characteristic of all ad-hoc networks is that of emergent properties. Intuitively, emergent properties are features that cannot be provided by individual network nodes themselves but instead result from interaction and collaboration among ...

SESSION: Security analysis
Article
Privacy enhanced cellular access security

The 3G cellular access security architectures do not provide satisfactorily user privacy and fail to fully include all three principal entities involved in the security context. In this paper we propose a beyond-3G Privacy Enhanced 3-Way Authentication ...

Article
Strengthening EPC tags against cloning

The EPC (Electronic Product Code) tag is a form of RFID (Radio-Frequency IDentification) device that is emerging as a successor to the printed barcode. Like barcodes, EPC tags emit static codes that serve to identify and track shipping containers and ...

Article
Modeling epidemic spreading in mobile environments

The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunately, standard techniques for modeling computer virus propagation cannot be ...

SESSION: Synchronization
Article
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks

Under-Water Sensor Networking (UWSN) is a novel network paradigm that is being proposed to explore, monitor and protect the oceans. The unique characteristics of the aquatic environment, namely huge propagation delay, absence of GPS signaling, floating ...

Article
Secure time synchronization service for sensor networks

In this paper, we analyze attacks on existing time synchronization protocols for wireless sensor networks. We propose a secure time synchronization toolbox to counter these attacks. This toolbox includes protocols for secure pairwise and group ...

Contributors
  • Indiana University Bloomington
  • University of Washington
  1. Proceedings of the 4th ACM workshop on Wireless security

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate 10 of 41 submissions, 24%
    YearSubmittedAcceptedRate
    WiSe '03411024%
    Overall411024%