PDF

ACM Workshop on Wireless Security (WiSe 2005)

Workshop Program

September 2, 2005

Cologne, Germany

 

Friday, September 2, 2005
08:30 - 08:40 WiSe Introduction and Awards
08:40 - 10:10

Session 1: Key Management

Session Chair: Wenke Lee

08:40 - 09:10

 

Efficient Key Establishment for Group-Based Wireless Sensor Deployments

 

Li Zhou, Jinfeng Ni, Chinya V. Ravishankar (University of California at Riverside)

 

09:10 - 09:40 Group-Based Key Pre-Distribution in Wireless Sensor Networks
 

Donggang Liu (University of Texas at Arlington), Peng Ning (NCSU), Wenliang Du (Syracuse University)

 

09:40 - 10:10 Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks
 

Johann van der Merwe, Dawoud Dawoud, Stephen McDonald (University of KwaZulu)

 

10:10 - 10:20 Coffee Break
10:20 - 11:20

 

Session 2: KEYNOTE TALK

Session Chair: Srdjan Capkun

 

 

 

The Security of Vehicular Networks

Professor Jean-Pierre Hubaux, EPFL
11:20 - 11:30 Break
11:30 - 12:30

Session 3: Misbehavior

Session Chair: Loukas Lazos

11:30 - 12:00

 

A Framework for MAC  Protocol Misbehavior Detection in Wireless Networks

 

Svetlana Radosavac (University of Maryland), John S. Baras (University of Maryland), Iordanis Koutsopoulos (University of Thessaly)

 

12:00 - 12:30 Hotspot-Based Traceback for Mobile Ad Hoc Networks
Yi-an Huang and Wenke Lee (Georgia Tech)
12:30 - 13:30

Session 4: Poster Presentations

Session Chair: Iordanis Koutsopolous

 

 

Experimental Comparisons between SAODV and AODV Routing Protocol

 

Yuxia Lin, A. Hamed Mohsenian Rad, Vincent W.S. Wong, Joo-Han Song (University of British Columbia)

 

Anonymous On Demand Routing in Mobile Ad hoc Networks
 

Stefaan Seys and Bart Preneel (K.U.Leuven)

 

  Two Practical Attacks Against Bluetooth Security Using New Enhanced Implementations of Security Analysis Tools
Keijo Haataja (University of Kuopio)
13:30 - 14:30

 

Session 5: KEYNOTE TALK

Session Chair: Radha Poovendran

 

 

 

Emergent Properties in Ad-Hoc Networks: A Security Perspective

Professor Virgil D. Gligor, University of Maryland
14:30 - 14:40 Break
14:40 - 16:10

Session 6: Security Analysis

Session Chair: TBA

14:40 - 15:10

 

Privacy Enhanced Cellular Access Security

 

Geir Myrdahl Koien (Telenor R & D and Agder University College)

 

15:10 - 15:40 Strengthening EPC Tags Against Cloning
 

Ari Juels (RSA Laboratories)

 

15:40 - 16:10 Modeling Epidemic Spreading in Mobile Environments
James W. Mickens, Brian D. Noble (University of Michigan)
16:10 - 16:20 Coffee Break
16:20 - 17:20

Session 7: Synchronization

Session Chair: Ari Juels

16:20 - 16:50

 

Low-cost Attacks against Packet Delivery, Localization and Time Synchronization Services in Under-Water Sensor Networks

 

Jiejun Kong (UCLA), Zhengrong Ji (UCLA), Weichao Wang (Purdue University), Mario Gerla (UCLA), Rajive Bagrodia (UCLA), Bharat Bhargava (Purdue University)

 

16:50 - 17:20 Secure Time Synchronization Service for Sensor Networks
Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava (UCLA)