skip to main content
10.1145/1352533acmconferencesBook PagePublication PageswisecConference Proceedingsconference-collections
WiSec '08: Proceedings of the first ACM conference on Wireless network security
ACM2008 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WISEC '08: First ACM Conference on Wireless Network Security Alexandria VA USA 31 March 2008- 2 April 2008
ISBN:
978-1-59593-814-5
Published:
31 March 2008
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is an honor and pleasure to welcome you to the first ACM Wireless Networks Security Conference. I hope that you will find the technical program stimulating, that our meeting venue will facilitate useful discussions, and that this conference will lead to fruitful collaborations in the future.

During the past decade, it became increasingly clear to most researchers in our field that wireless communication technology would pose significant and unique security challenges. Wireless networks represent the underlying technology of what we now call ubiquitous computing. These networks are frequently deployed in environments that are vulnerable to previously unanticipated forms of adversarial attacks. Indeed, several types of wireless networks include components that operate in an unattended manner in potentially hostile settings. This fact and the typical resource constraints that many wireless networks experience has triggered a reassessment of the adversaries' capabilities and modes of attack. New security problems have arisen and along have come new opportunities for fertile research and development. Many of these opportunities are reflected in the program of this conference.

This first WiSec conference is the result of discussions among several researchers who have been active participants in workshops on wireless, mobile, and ad hoc networks for the past few years. In mid' 2006 it became apparent that the three main workshops focusing on security of mobile ad-hoc and sensor networks, namely ACM Wireless Security Workshop (Wise), held in conjunction with ACM Mobicom, ACM Workshop Security in Ad Hoc and Sensor Networks (SASN), held in conjunction with ACM CCS, and the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), have outgrown their initial scope. Several members of what later became the Steering Committee of WiSec felt that bringing together participants who traditionally attended these workshops would help consolidate the previously separate efforts in areas of common interest. The Steering Committee agreed that WiSec would alternate holding its technical meetings between the US and Europe, at least for the near future. Of course, we hope that increasing participation from Asia will enable us to extend our meeting venues to include Asia as well.

Skip Table Of Content Section
SESSION: Authentication in wireless networks
research-article
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks

Recent studies have demonstrated that it is possible to perform public key cryptographic operations on the resource-constrained sensor platforms. However, the significant resource consumption imposed by public key cryptographic operations makes such ...

research-article
Defending against false-endorsement-based dos attacks in wireless sensor networks

Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised sensor nodes to inject false data to deceive the base station or he can try to deplete the energy resources of the sensor nodes. One approach to mitigate ...

research-article
Wireless authentication using remote passwords

Current wireless authentication mechanisms typically rely on inflexible shared secrets or a heavyweight public-key infrastructure with user-specific digital certificates and, as such, lack general support for environments with dynamic user bases where ...

research-article
Comparison of innovative signature algorithms for WSNs

For many foreseen applications of Wireless Sensor Networks (WSN) - for example monitoring the structural health of a bridge - message integrity is a crucial requirement. Usually, security services such as message integrity are realized by symmetric ...

SESSION: Device identification and privacy
research-article
Wireless client puzzles in IEEE 802.11 networks: security by wireless

Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP's memory resources and result in denied association service, thus enabling more ...

research-article
Identifying unique devices through wireless fingerprinting

We propose a new fingerprinting technique that differentiates between unique devices over a Wireless Local Area Network (WLAN) simply through the timing analysis of 802.11 probe request frames. Our technique can be applied to spoof detection, network ...

research-article
Active behavioral fingerprinting of wireless devices

We propose a simple active method for discovering facts about the chipset, the firmware or the driver of an 802.11 wireless device by observing its responses (or lack thereof) to a series of crafted non-standard or malformed 802.11 frames. We ...

research-article
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks

Roaming services in wireless networks provide people with preferable flexibility and convenience. However, such advantages should be offered with both security and privacy in mind. With consideration on privacy protection during roaming in wireless ...

SESSION: Sensor network security
research-article
An efficient integrity-preserving scheme for hierarchical sensor aggregation

Sensor networks have proven to be useful in many application domains. Having the sensor nodes aggregate their results inside the network before sending the results to a base station has been shown to increase the lifetime of the network. However, sensor ...

research-article
Towards event source unobservability with minimum network traffic in sensor networks

Sensors deployed to monitor the surrounding environment report such information as event type, location, and time when a real event of interest is detected. An adversary may identify the real event source through eavesdropping and traffic analysis. ...

research-article
Mitigating attacks against virtual coordinate based routing in wireless sensor networks

Virtual coordinate system (VCS) based routing provides a practical, efficient and scalable means for point-to-point routing in wireless sensor networks. Several VCS-based routing protocols have been proposed in the last few years, all assuming that ...

SESSION: Key management
research-article
Key management and secure software updates in wireless process control environments

Process control systems using wireless sensor nodes are large and complex environments built to last for a long time. Cryptographic keys are typically preloaded in the wireless nodes prior to deployment and used for the rest of their lifetime. To reduce ...

research-article
Slede: a domain-specific verification framework for sensor network security protocol implementations

Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to protect against more system failures compared to traditional protocols. ...

research-article
Minimum node degree and κ-connectivity for key predistribution schemes and distributed sensor networks

Connectivity is a desired property for distributed sensor networks (DSNs)secured by key predistribution schemes (KPSs). Previous research has studied whether a DSN is connected using the random graph model, but there has been no research on how strong ...

research-article
Mind your manners: socially appropriate wireless key establishment for groups

Group communication is inherently a social activity. However, existing protocols for group key establishment often fail to consider important social dynamics. This paper examines the human requirements for wireless group key establishment. We identify ...

SESSION: RFID and embedded sensors
research-article
Wireless and physical security via embedded sensor networks

Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames(Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the ...

research-article
RFID authentication protocol for low-cost tags

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ...

research-article
Body sensor network security: an identity-based cryptography approach

A body sensor network (BSN), is a network of sensors deployed on a person's body, usually for health care monitoring. Since the sensors collect personal medical data, security and privacy are important components in a body sensor network. At the same ...

research-article
Self-certified Sybil-free pseudonyms

Accurate and trusted identifiers are a centerpiece for any security architecture. Protecting against Sybil attacks in a privacy-friendly manner is a non-trivial problem in wireless infrastructureless networks, such as mobile ad hoc networks. In this ...

PANEL SESSION: Panel
panel
RFID security and privacy: long-term research or short-term tinkering?

RFID technology has raised a number of both real and imagined security and privacy fears and concerns. Since roughly 2001, a number of researchers have stepped up to the plate and proposed techniques for strengthening RFID security and privacy, while ...

SESSION: Multi-hop applications and mal-packets
research-article
A secure and resilient WSN roadside architecture for intelligent transport systems

We propose a secure and resilient WSN roadside architecture for intelligent transport systems which supports the two complementary services accident prevention and post-accident investigation. Our WSN security architecture is stimulated by the ...

research-article
Towards self-propagate mal-packets in sensor networks

Since sensor applications are implemented in embedded computer systems, cyber attacks that compromise regular computer systems via exploiting memory related vulnerabilities present similar threats to sensor networks. However, the paper shows that memory ...

research-article
Secure multi-hop network programming with multiple one-way key chains

Current network programming protocols provide an efficient way to update the program image running on sensor nodes without physical access to them. However, given the open environment in which sensor nodes are deployed, securing network programming is a ...

SESSION: Defensive techniques
research-article
Attacks on time-of-flight distance bounding channels

Cryptographic distance-bounding protocols verify the proximity of two parties by timing a challenge-response exchange. Such protocols rely on the underlying communication channel for accurate and fraud-resistant round- trip-time measurements, therefore ...

research-article
Anti-jamming timing channels for wireless networks

Wireless communication is susceptible to radio interference, which prevents the reception of communications. Although evasion strategies have been proposed, such strategies are costly or ineffective against broadband jammers. In this paper, we explore ...

research-article
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks

One of the most vexing problems in wireless sensor network security is the node capture attack. An adversary can capture a node from the network as the first step for further different types of attacks. For example, the adversary can collect all the ...

research-article
Simple and effective defense against evil twin access points

Wireless networking is widespread in public places such as cafes. Unsuspecting users may become victims of attacks based on "evil twin" access points. These rogue access points are operated by criminals in an attempt to launch man-in-the-middle attacks. ...

keynote
RFID security: in the shoulder and on the loading dock

RFID (Radio-Frequency IDentification) tags are microchips that communicate via radio. In common use today, they promise to become a ubiquitous tool for labeling objects and identifying people. Protection against counterfeiting and privacy infringement ...

Contributors
  • Carnegie Mellon University
  • University of Washington

Index Terms

  1. Proceedings of the first ACM conference on Wireless network security

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate98of338submissions,29%
      YearSubmittedAcceptedRate
      WiSec '211213428%
      WiSec '16511325%
      WiSec '14962526%
      WiSec '13702637%
      Overall3389829%