It is an honor and pleasure to welcome you to the first ACM Wireless Networks Security Conference. I hope that you will find the technical program stimulating, that our meeting venue will facilitate useful discussions, and that this conference will lead to fruitful collaborations in the future.
During the past decade, it became increasingly clear to most researchers in our field that wireless communication technology would pose significant and unique security challenges. Wireless networks represent the underlying technology of what we now call ubiquitous computing. These networks are frequently deployed in environments that are vulnerable to previously unanticipated forms of adversarial attacks. Indeed, several types of wireless networks include components that operate in an unattended manner in potentially hostile settings. This fact and the typical resource constraints that many wireless networks experience has triggered a reassessment of the adversaries' capabilities and modes of attack. New security problems have arisen and along have come new opportunities for fertile research and development. Many of these opportunities are reflected in the program of this conference.
This first WiSec conference is the result of discussions among several researchers who have been active participants in workshops on wireless, mobile, and ad hoc networks for the past few years. In mid' 2006 it became apparent that the three main workshops focusing on security of mobile ad-hoc and sensor networks, namely ACM Wireless Security Workshop (Wise), held in conjunction with ACM Mobicom, ACM Workshop Security in Ad Hoc and Sensor Networks (SASN), held in conjunction with ACM CCS, and the European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), have outgrown their initial scope. Several members of what later became the Steering Committee of WiSec felt that bringing together participants who traditionally attended these workshops would help consolidate the previously separate efforts in areas of common interest. The Steering Committee agreed that WiSec would alternate holding its technical meetings between the US and Europe, at least for the near future. Of course, we hope that increasing participation from Asia will enable us to extend our meeting venues to include Asia as well.
Proceeding Downloads
Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks
Recent studies have demonstrated that it is possible to perform public key cryptographic operations on the resource-constrained sensor platforms. However, the significant resource consumption imposed by public key cryptographic operations makes such ...
Defending against false-endorsement-based dos attacks in wireless sensor networks
Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised sensor nodes to inject false data to deceive the base station or he can try to deplete the energy resources of the sensor nodes. One approach to mitigate ...
Wireless authentication using remote passwords
Current wireless authentication mechanisms typically rely on inflexible shared secrets or a heavyweight public-key infrastructure with user-specific digital certificates and, as such, lack general support for environments with dynamic user bases where ...
Comparison of innovative signature algorithms for WSNs
For many foreseen applications of Wireless Sensor Networks (WSN) - for example monitoring the structural health of a bridge - message integrity is a crucial requirement. Usually, security services such as message integrity are realized by symmetric ...
Wireless client puzzles in IEEE 802.11 networks: security by wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP's memory resources and result in denied association service, thus enabling more ...
Identifying unique devices through wireless fingerprinting
We propose a new fingerprinting technique that differentiates between unique devices over a Wireless Local Area Network (WLAN) simply through the timing analysis of 802.11 probe request frames. Our technique can be applied to spoof detection, network ...
Active behavioral fingerprinting of wireless devices
We propose a simple active method for discovering facts about the chipset, the firmware or the driver of an 802.11 wireless device by observing its responses (or lack thereof) to a series of crafted non-standard or malformed 802.11 frames. We ...
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
Roaming services in wireless networks provide people with preferable flexibility and convenience. However, such advantages should be offered with both security and privacy in mind. With consideration on privacy protection during roaming in wireless ...
An efficient integrity-preserving scheme for hierarchical sensor aggregation
Sensor networks have proven to be useful in many application domains. Having the sensor nodes aggregate their results inside the network before sending the results to a base station has been shown to increase the lifetime of the network. However, sensor ...
Towards event source unobservability with minimum network traffic in sensor networks
Sensors deployed to monitor the surrounding environment report such information as event type, location, and time when a real event of interest is detected. An adversary may identify the real event source through eavesdropping and traffic analysis. ...
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
Virtual coordinate system (VCS) based routing provides a practical, efficient and scalable means for point-to-point routing in wireless sensor networks. Several VCS-based routing protocols have been proposed in the last few years, all assuming that ...
Key management and secure software updates in wireless process control environments
Process control systems using wireless sensor nodes are large and complex environments built to last for a long time. Cryptographic keys are typically preloaded in the wireless nodes prior to deployment and used for the rest of their lifetime. To reduce ...
Slede: a domain-specific verification framework for sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to protect against more system failures compared to traditional protocols. ...
Minimum node degree and κ-connectivity for key predistribution schemes and distributed sensor networks
Connectivity is a desired property for distributed sensor networks (DSNs)secured by key predistribution schemes (KPSs). Previous research has studied whether a DSN is connected using the random graph model, but there has been no research on how strong ...
Mind your manners: socially appropriate wireless key establishment for groups
Group communication is inherently a social activity. However, existing protocols for group key establishment often fail to consider important social dynamics. This paper examines the human requirements for wireless group key establishment. We identify ...
Wireless and physical security via embedded sensor networks
Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames(Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the ...
RFID authentication protocol for low-cost tags
In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ...
Body sensor network security: an identity-based cryptography approach
A body sensor network (BSN), is a network of sensors deployed on a person's body, usually for health care monitoring. Since the sensors collect personal medical data, security and privacy are important components in a body sensor network. At the same ...
Self-certified Sybil-free pseudonyms
Accurate and trusted identifiers are a centerpiece for any security architecture. Protecting against Sybil attacks in a privacy-friendly manner is a non-trivial problem in wireless infrastructureless networks, such as mobile ad hoc networks. In this ...
RFID security and privacy: long-term research or short-term tinkering?
RFID technology has raised a number of both real and imagined security and privacy fears and concerns. Since roughly 2001, a number of researchers have stepped up to the plate and proposed techniques for strengthening RFID security and privacy, while ...
A secure and resilient WSN roadside architecture for intelligent transport systems
We propose a secure and resilient WSN roadside architecture for intelligent transport systems which supports the two complementary services accident prevention and post-accident investigation. Our WSN security architecture is stimulated by the ...
Towards self-propagate mal-packets in sensor networks
Since sensor applications are implemented in embedded computer systems, cyber attacks that compromise regular computer systems via exploiting memory related vulnerabilities present similar threats to sensor networks. However, the paper shows that memory ...
Secure multi-hop network programming with multiple one-way key chains
Current network programming protocols provide an efficient way to update the program image running on sensor nodes without physical access to them. However, given the open environment in which sensor nodes are deployed, securing network programming is a ...
Attacks on time-of-flight distance bounding channels
Cryptographic distance-bounding protocols verify the proximity of two parties by timing a challenge-response exchange. Such protocols rely on the underlying communication channel for accurate and fraud-resistant round- trip-time measurements, therefore ...
Anti-jamming timing channels for wireless networks
Wireless communication is susceptible to radio interference, which prevents the reception of communications. Although evasion strategies have been proposed, such strategies are costly or ineffective against broadband jammers. In this paper, we explore ...
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
One of the most vexing problems in wireless sensor network security is the node capture attack. An adversary can capture a node from the network as the first step for further different types of attacks. For example, the adversary can collect all the ...
Simple and effective defense against evil twin access points
Wireless networking is widespread in public places such as cafes. Unsuspecting users may become victims of attacks based on "evil twin" access points. These rogue access points are operated by criminals in an attempt to launch man-in-the-middle attacks. ...
RFID security: in the shoulder and on the loading dock
RFID (Radio-Frequency IDentification) tags are microchips that communicate via radio. In common use today, they promise to become a ubiquitous tool for labeling objects and identifying people. Protection against counterfeiting and privacy infringement ...
Index Terms
Proceedings of the first ACM conference on Wireless network security




