[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1023646acmconferencesBook PagePublication PagesmobicomConference Proceedingsconference-collections
WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security
ACM2004 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WiSE04: 2004 ACM Workshop on Wireless Security ( co-located with Mobicom 2004 Conference ) Philadelphia PA USA 1 October 2004
ISBN:
978-1-58113-925-9
Published:
01 October 2004
Sponsors:

Reflects downloads up to 10 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

Welcome to the third ACM Workshop on Wireless Security (WiSe). This workshop is being organized with the goal of providing a forum for the exciting research in the increasingly important area of wireless security. We also hope that this workshop will bring together wireless networking and security research communities. Such interactions are expected to increase the number and quality of wireless security research.The workshop received 48 paper submissions, and we thank all the authors for submitting their work to the workshop. Ten submissions were accepted as regular papers which will be presented in the paper sessions at the workshop. Due to the time limitations of a one-day workshop, many interesting submissions could not be accepted as regular papers. The program committee, therefore, recommended some of the submissions for inclusion in a poster session. The poster session at the workshop will include seven such presentations. We have an excellent program, and we believe that you will enjoy attending both the paper and poster presentations.

Skip Table Of Content Section
SESSION: Secure services
Article
Trust evaluation in ad-hoc networks

An important concept in network security is trust, interpreted as a relation among entities that participate in various protocols. Trust relations are based on evidence related to the previous interactions of entities within a protocol. In this work, we ...

Article
JANUS: towards robust and malicious resilient routing in hybrid wireless networks

In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with dual cellular and ad-hoc (802.11b) cards. The cellular connection is used ...

Article
SeRLoc: secure range-independent localization for wireless sensor networks

In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For location-aware WSN applications, it is essential to ensure that sensors can determine their location, even in the presence of malicious ...

SESSION: Invited talk
Article
RFID: security and privacy for five-cent wireless devices (abstract only)

A radio-frequency identification (RFID) tag is a small, inexpensive wireless device that emits an identifier in response to interrogation from a nearby reader. The price of basic RFID tags promises to drop to the range of several cents per unit in the ...

SESSION: Security analysis
Article
Security considerations for IEEE 802.15.4 networks

The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification includes a number of security provisions and options. In this paper, we ...

Article
Analysis of the 802.11i 4-way handshake

802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), the authenticator (access point), and the authentication server (e.g., a ...

SESSION: Attack detection
Article
Visualization of wormholes in sensor networks

Several protocols have been proposed to defend against wormholes in ad hoc networks by adopting positioning devices, synchronized clocks, or directional antennas. In this paper, we propose a mechanism, MDS-VOW, to detect wormholes in a sensor network. ...

Article
Mobility-based anomaly detection in cellular mobile networks

This paper presents an efficient on-line anomaly detection algorithm that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme is derived from a well-developed data compression ...

SESSION: Wireless monitoring and denial of service
Article
A framework for wireless LAN monitoring and its applications

Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of the network based on wired monitoring (e.g. sniffer at some wired point) or ...

Article
Channel surfing and spatial retreats: defenses against wireless denial of service

Wireless networks are built upon a shared medium that makes it easy for adversaries to launch denial of service (DoS) attacks. One form of denial of service is targeted at preventing sources from communicating. These attacks can be easily accomplished ...

Article
A man-in-the-middle attack on UMTS

In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows an intruder to impersonate a valid GSM base station to a UMTS subscriber ...

Contributors
  • Indiana University Bloomington
  • Swiss Federal Institute of Technology, Zurich
  1. Proceedings of the 3rd ACM workshop on Wireless security
    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations

    Acceptance Rates

    Overall Acceptance Rate 10 of 41 submissions, 24%
    YearSubmittedAcceptedRate
    WiSe '03411024%
    Overall411024%