ACM Workshop on Wireless Security (WiSe 2005)
Workshop Program
September 2, 2005
Cologne, Germany
Friday, September 2, 2005 | |
08:30 - 08:40 | WiSe Introduction and Awards |
08:40 - 10:10 |
Session 1: Key Management Session Chair: Wenke Lee |
08:40 - 09:10 |
Efficient Key Establishment for Group-Based Wireless Sensor Deployments |
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar (University of California at Riverside)
|
|
09:10 - 09:40 | Group-Based Key Pre-Distribution in Wireless Sensor Networks |
Donggang Liu (University of Texas at Arlington), Peng Ning (NCSU), Wenliang Du (Syracuse University)
|
|
09:40 - 10:10 | Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks |
Johann van der Merwe, Dawoud Dawoud, Stephen McDonald (University of KwaZulu)
|
|
10:10 - 10:20 | Coffee Break |
10:20 - 11:20 |
Session 2: KEYNOTE TALK Session Chair: Srdjan Capkun
|
|
|
Professor Jean-Pierre Hubaux, EPFL | |
11:20 - 11:30 | Break |
11:30 - 12:30 |
Session 3: Misbehavior Session Chair: Loukas Lazos |
11:30 - 12:00 |
A Framework for MAC Protocol Misbehavior Detection in Wireless Networks |
Svetlana Radosavac (University of Maryland), John S. Baras (University of Maryland), Iordanis Koutsopoulos (University of Thessaly)
|
|
12:00 - 12:30 | Hotspot-Based Traceback for Mobile Ad Hoc Networks |
Yi-an Huang and Wenke Lee (Georgia Tech) | |
12:30 - 13:30 |
Session 4: Poster Presentations Session Chair: Iordanis Koutsopolous |
Experimental Comparisons between SAODV and AODV Routing Protocol |
|
Yuxia Lin, A. Hamed Mohsenian Rad, Vincent W.S. Wong, Joo-Han Song (University of British Columbia)
|
|
Anonymous On Demand Routing in Mobile Ad hoc Networks | |
Stefaan Seys and Bart Preneel (K.U.Leuven)
|
|
Two Practical Attacks Against Bluetooth Security Using New Enhanced Implementations of Security Analysis Tools | |
Keijo Haataja (University of Kuopio) | |
13:30 - 14:30 |
Session 5: KEYNOTE TALK Session Chair: Radha Poovendran
|
Emergent Properties in Ad-Hoc Networks: A Security Perspective |
|
Professor Virgil D. Gligor, University of Maryland | |
14:30 - 14:40 | Break |
14:40 - 16:10 |
Session 6: Security Analysis Session Chair: TBA |
14:40 - 15:10 |
Privacy Enhanced Cellular Access Security |
Geir Myrdahl Koien (Telenor R & D and Agder University College)
|
|
15:10 - 15:40 | Strengthening EPC Tags Against Cloning |
Ari Juels (RSA Laboratories)
|
|
15:40 - 16:10 | Modeling Epidemic Spreading in Mobile Environments |
James W. Mickens, Brian D. Noble (University of Michigan) | |
16:10 - 16:20 | Coffee Break |
16:20 - 17:20 |
Session 7: Synchronization Session Chair: Ari Juels |
16:20 - 16:50 |
Low-cost Attacks against Packet Delivery, Localization and Time Synchronization Services in Under-Water Sensor Networks |
Jiejun Kong (UCLA), Zhengrong Ji (UCLA), Weichao Wang (Purdue University), Mario Gerla (UCLA), Rajive Bagrodia (UCLA), Bharat Bhargava (Purdue University)
|
|
16:50 - 17:20 | Secure Time Synchronization Service for Sensor Networks |
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava (UCLA) |