Welcome to the fifth ACM Workshop on Wireless Security (WiSe). This workshop is being organized with the goal of providing a forum for the exciting research in the increasingly important area of wireless security. We also hope that this workshop will bring together wireless networking and security research communities and increase the quantity and quality of wireless security research.The workshop received forty-five paper submissions, for which we thank all of the contributing authors. Eleven submissions were accepted for presentation at the workshop. We have two excellent invited talks in the workshop, one by Nicholas Tsougas on "RFID Security and Privacy Concerns," and another by Prof. Adrian Perrig on "Security in Sensor Networks: Industry Trends, Present and Future Research Directions." We hope and believe that you will enjoy attending the workshop.
Proceeding Downloads
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. Integrity regions are based on the verification of entity proximity through ...
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the place and time of the communication between the mobile devices. The ...
Location dependent key management using random key-predistribution in sensor networks
In this paper we propose a location aware approach for key management in sensor networks. As a result, this approach not only provides for better connectivity of sensor nodes in the network but also provides for containment of node compromise. This ...
RFID security and privacy concerns
There are a number of business cases for passive RFID and most are based on the assumption that the RF tags, to include underlying IT systems are secure and authentic, and that privacy and security will not be a concern to the consumer. How do we ...
Securing wireless systems via lower layer enforcements
Although conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, these techniques do not directly leverage the unique properties of the wireless domain to address security threats. The ...
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple illegitimate identities. For example, several link-layer services in IEEE ...
Security in sensor networks: industry trends, present and future research directions
Security is of critical importance for the successful deployment of sensor networks, since it can ensure properties such as data integrity, secrecy, and availability. We have the unique opportunity to ensure security even for early deployments of sensor ...
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bounded adversary model, the cost of attack and the cost of defense. In a ...
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems
Measuring communication anonymity (e.g., unlinkability) of wireless ad hoc networks is a critical but still unsolved problem. In order to solve this problem, we propose a two-step unlinkability measuring approach: (a) statistical traffic analysis-based ...
Impact of paging channel overloads or attacks on a cellular network
IP and cellular phone networks used to be isolated from each other. In recent years however, the two networks have started to overlap with the emergence of devices that access the Internet using cellular infrastructures. One important question then, ...
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor network that can detect compromised nodes without false negatives, and ...
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular phones and mobile handhelds. However, this increasing convergence has also ...
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks
This paper gives an approach to reputation computation that incorporates "uncertainty" based on subjective logic. Uncertainty can arise when a node joins the network and thus has no history, or when a node's behavior changes in a way that is not clearly ...
- Proceedings of the 5th ACM workshop on Wireless security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
WiSe '03 | 41 | 10 | 24% |
Overall | 41 | 10 | 24% |