skip to main content
10.1145/1161289acmconferencesBook PagePublication PagesmobicomConference Proceedingsconference-collections
WiSe '06: Proceedings of the 5th ACM workshop on Wireless security
ACM2006 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
DIWANS06: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks 2006 Los Angeles California 29 September 2006
ISBN:
978-1-59593-557-1
Published:
28 September 2006
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 03 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

Welcome to the fifth ACM Workshop on Wireless Security (WiSe). This workshop is being organized with the goal of providing a forum for the exciting research in the increasingly important area of wireless security. We also hope that this workshop will bring together wireless networking and security research communities and increase the quantity and quality of wireless security research.The workshop received forty-five paper submissions, for which we thank all of the contributing authors. Eleven submissions were accepted for presentation at the workshop. We have two excellent invited talks in the workshop, one by Nicholas Tsougas on "RFID Security and Privacy Concerns," and another by Prof. Adrian Perrig on "Security in Sensor Networks: Industry Trends, Present and Future Research Directions." We hope and believe that you will enjoy attending the workshop.

Skip Table Of Content Section
SESSION: Location-based techniques
Article
Integrity regions: authentication through presence in wireless networks

We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. Integrity regions are based on the verification of entity proximity through ...

Article
Location privacy in wireless personal area networks

Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the place and time of the communication between the mobile devices. The ...

Article
Location dependent key management using random key-predistribution in sensor networks

In this paper we propose a location aware approach for key management in sensor networks. As a result, this approach not only provides for better connectivity of sensor nodes in the network but also provides for containment of node compromise. This ...

SESSION: Keynote talk 1
Article
RFID security and privacy concerns

There are a number of business cases for passive RFID and most are based on the assumption that the RF tags, to include underlying IT systems are secure and authentic, and that privacy and security will not be a concern to the consumer. How do we ...

SESSION: Radio-layer security
Article
Securing wireless systems via lower layer enforcements

Although conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, these techniques do not directly leverage the unique properties of the wireless domain to address security threats. The ...

Article
Detecting identity-based attacks in wireless networks using signalprints

Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple illegitimate identities. For example, several link-layer services in IEEE ...

SESSION: Keynote talk 2
Article
Security in sensor networks: industry trends, present and future research directions

Security is of critical importance for the successful deployment of sensor networks, since it can ensure properties such as data integrity, secrecy, and availability. We have the unique opportunity to ensure security even for early deployments of sensor ...

SESSION: Assessing vulnerabilities
Article
Modeling Ad-hoc rushing attack in a negligibility-based security framework

In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bounded adversary model, the cost of attack and the cost of defense. In a ...

Article
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems

Measuring communication anonymity (e.g., unlinkability) of wireless ad hoc networks is a critical but still unsolved problem. In order to solve this problem, we propose a two-step unlinkability measuring approach: (a) statistical traffic analysis-based ...

Article
Impact of paging channel overloads or attacks on a cellular network

IP and cellular phone networks used to be isolated from each other. In recent years however, the two networks have started to overlap with the emergence of devices that access the Internet using cellular infrastructures. One important question then, ...

SESSION: Defensive techniques
Article
SCUBA: Secure Code Update By Attestation in sensor networks

This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor network that can detect compromised nodes without false negatives, and ...

Article
Proactive security for mobile messaging networks

The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular phones and mobile handhelds. However, this increasing convergence has also ...

Article
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks

This paper gives an approach to reputation computation that incorporates "uncertainty" based on subjective logic. Uncertainty can arise when a node joins the network and thus has no history, or when a node's behavior changes in a way that is not clearly ...

Contributors
  • University of Washington
  • Cornell Tech
  1. Proceedings of the 5th ACM workshop on Wireless security

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate 10 of 41 submissions, 24%
      YearSubmittedAcceptedRate
      WiSe '03411024%
      Overall411024%