ACM Workshop on Wireless Security (WiSe 2005)
Workshop Program
September 2, 2005
Cologne, Germany
| Friday, September 2, 2005 | |
| 08:30 - 08:40 | WiSe Introduction and Awards |
| 08:40 - 10:10 |
Session 1: Key Management Session Chair: Wenke Lee |
| 08:40 - 09:10 |
Efficient Key Establishment for Group-Based Wireless Sensor Deployments |
|
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar (University of California at Riverside)
|
|
| 09:10 - 09:40 | Group-Based Key Pre-Distribution in Wireless Sensor Networks |
|
Donggang Liu (University of Texas at Arlington), Peng Ning (NCSU), Wenliang Du (Syracuse University)
|
|
| 09:40 - 10:10 | Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks |
|
Johann van der Merwe, Dawoud Dawoud, Stephen McDonald (University of KwaZulu)
|
|
| 10:10 - 10:20 | Coffee Break |
| 10:20 - 11:20 |
Session 2: KEYNOTE TALK Session Chair: Srdjan Capkun
|
|
|
|
| Professor Jean-Pierre Hubaux, EPFL | |
| 11:20 - 11:30 | Break |
| 11:30 - 12:30 |
Session 3: Misbehavior Session Chair: Loukas Lazos |
| 11:30 - 12:00 |
A Framework for MAC Protocol Misbehavior Detection in Wireless Networks |
|
Svetlana Radosavac (University of Maryland), John S. Baras (University of Maryland), Iordanis Koutsopoulos (University of Thessaly)
|
|
| 12:00 - 12:30 | Hotspot-Based Traceback for Mobile Ad Hoc Networks |
| Yi-an Huang and Wenke Lee (Georgia Tech) | |
| 12:30 - 13:30 |
Session 4: Poster Presentations Session Chair: Iordanis Koutsopolous |
|
Experimental Comparisons between SAODV and AODV Routing Protocol |
|
|
Yuxia Lin, A. Hamed Mohsenian Rad, Vincent W.S. Wong, Joo-Han Song (University of British Columbia)
|
|
| Anonymous On Demand Routing in Mobile Ad hoc Networks | |
|
Stefaan Seys and Bart Preneel (K.U.Leuven)
|
|
| Two Practical Attacks Against Bluetooth Security Using New Enhanced Implementations of Security Analysis Tools | |
| Keijo Haataja (University of Kuopio) | |
| 13:30 - 14:30 |
Session 5: KEYNOTE TALK Session Chair: Radha Poovendran
|
|
Emergent Properties in Ad-Hoc Networks: A Security Perspective |
|
| Professor Virgil D. Gligor, University of Maryland | |
| 14:30 - 14:40 | Break |
| 14:40 - 16:10 |
Session 6: Security Analysis Session Chair: TBA |
| 14:40 - 15:10 |
Privacy Enhanced Cellular Access Security |
|
Geir Myrdahl Koien (Telenor R & D and Agder University College)
|
|
| 15:10 - 15:40 | Strengthening EPC Tags Against Cloning |
|
Ari Juels (RSA Laboratories)
|
|
| 15:40 - 16:10 | Modeling Epidemic Spreading in Mobile Environments |
| James W. Mickens, Brian D. Noble (University of Michigan) | |
| 16:10 - 16:20 | Coffee Break |
| 16:20 - 17:20 |
Session 7: Synchronization Session Chair: Ari Juels |
| 16:20 - 16:50 |
Low-cost Attacks against Packet Delivery, Localization and Time Synchronization Services in Under-Water Sensor Networks |
|
Jiejun Kong (UCLA), Zhengrong Ji (UCLA), Weichao Wang (Purdue University), Mario Gerla (UCLA), Rajive Bagrodia (UCLA), Bharat Bhargava (Purdue University)
|
|
| 16:50 - 17:20 | Secure Time Synchronization Service for Sensor Networks |
| Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava (UCLA) | |