Welcome to the Second ACM Workshop on Wireless Security (WiSe). This workshop is being organized with the goal of providing a forum for the exciting research in the increasingly important area of wireless security. We also hope that this workshop will bring together wireless networking and security research communities. Such interactions are expected to increase the number and quality of wireless security research.The workshop received 41 paper submissions, and we thank all the authors for submitting their work to the workshop. Ten submissions were accepted as regular papers which will be presented in the paper sessions at the workshop. Due to the time limitations of a one-day workshop, many interesting submissions could not be accepted as regular papers. The program committee, therefore, recommended some of the submissions for inclusion in a poster session. The poster session at the workshop will include four such presentations. We have an excellent program, and we believe that you will enjoy attending the paper and poster presentations.
Secure verification of location claims
With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then,...
Wireless LAN location-sensing for security applications
This paper considers the problem of using wireless LAN location-sensing for security applications. Recently, Bayesian methods have been successfully used to determine location from wireless LAN signals, but such methods have the drawback that a model ...
BISS: building secure routing out of an incomplete set of security associations
We investigate secure routing in ad hoc networks in which security associations exist only between a subset of all pairs of nodes. We focus on source routing protocols. We show that to establish secure routes, it is in general not necessary that ...
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many of the proposed routing protocols for ad hoc networks operate in an on-...
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. In ...
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains
In this work we design and implement ESCORT, a backward compatible, efficient, and secure access control system, to facilitate mobile wireless access to secured wireless LANs. In mobile environments, a mobile guest may frequently roam into foreign ...
On securely enabling intermediary-based services and performance enhancements for wireless mobile users
Intermediary-based services and performance optimizations are increasingly being considered, by network service providers, with a view towards offering value-added services and improving the user experience of wireless mobile clients at reduced costs. ...
Alert aggregation in mobile ad hoc networks
In Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs), IDS agents using local detection engines alone may lead to undesirable performance due to the dynamic feature of MANETs. In this paper, we present a nonoverlapping Zone-based ...
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigated. In this paper, we explore the task of providing data and entity ...
On the security of wireless network access with enhancements
The security of the current 3G wireless protocols addresses the problems faced by the 2G systems, in addition to fulfilling the higher 3G security requirements mandated from operating in IP networks as well as voice networks. However, the approach ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
WiSe '03 | 41 | 10 | 24% |
Overall | 41 | 10 | 24% |