Wireless technologies have had significant impact on how society views computing and communication. Ubiquitous wireless network access has caused a dramatic shift in how we apply network services, moving us ever closer towards the "anytime anywhere" promise of the mobile Internet. However, the same affordability and availability of wireless technologies that make them so attractive also make them an enticing target for security threats.
As a community, we are asked to continuously adapt and expand our definition of "wireless security." Achieving security and privacy over an open broadcast medium using affordable and increasingly programmable wireless devices in an environment where new mobile and social applications are continuously deployed (often without accounting for security into their design) is fraught with challenges. Compounded by the fact that security associations must be made without prior trust relationships, these challenges call for new techniques to address the emergence of new types of threats.
The ACM Conference on Security and Privacy in Wireless and Mobile Networks has been a premier venue for researchers in wireless security and privacy to present the latest research in the field. It has also served as a forum for fostering international collaboration to address eminent security threats faced by our society. Over the years, we have seen an evolution in research, from traditional network security to complex, multi-faceted security problems that cannot be effectively addressed using conventional techniques. In particular, we have witnessed the emergence of new wireless systems (e.g., cognitive radios, RFID, vehicular networks, 4G/WiMax), the widespread deployment of new communication platforms (e.g., smartphones) and of their applications (e.g., social media), as well as an increased awareness of privacy issues associated with these emerging technologies.
The WiSec'12 call-for-papers attracted 63 submissions from Asia, Australia, Europe, and the United States. We saw many exciting papers cross our (virtual) desks, and after a thorough review process (many thanks to the reviewers for their diligence), we arrived at a collection of 17 papers that we felt are mature and ready to be presented to the security community and to be included in the conference proceedings.
The 17 accepted papers can be broadly classified into the following themes:
Physical-layer security for wireless systems
Privacy in wireless systems
Mobile device and application security
Supply chain and manufacturing security
Foundations of wireless network security
We have chosen to arrange the talks according to these rough topical areas, realizing that such a classification is never perfect and hoping that the authors and the audience appreciate all the talks for their individual and collective merit.
In addition to the research papers being presented at the conference, we also have two exciting keynotes, to be delivered by Dr. Ed Felten, Princeton University and the Federal Trade Commission ("Toward a Healthy Wireless Privacy Ecosystem") and Dr. Tadayoshi Kohno, University of Washington ("Security for Cyber-physical Systems: Case Studies with Medical Devices, Robots, and Automobiles"). We are fortunate to have both speakers, who have made significant contributions to security research at various levels, ranging from foundational contributions in cryptography, to system implementations and hacks, to guiding public policy. In addition to the two keynotes, the program includes two exciting panels, which aim at engaging industry, government, and academia in defining the problem space for security and privacy in wireless and mobile networks. Finally, we have included a poster session, with the goal of encouraging researchers to share their work-in-progress. We sincerely hope that you will take the opportunity to visit these posters and interact with their presenters.
Proceeding Downloads
Toward a healthy wireless privacy ecosystem
Privacy can be a fraught topic even on traditional desktop systems, and mobility only complicates the issue. Consumers, companies, researchers, and government all want an outcome in which consumers feel safe entrusting their data to mobile technologies, ...
On the capacity of rate-adaptive packetized wireless communication links under jamming
We formulate the interaction between the communicating nodes and an adversary within a game-theoretic context. We show that earlier information-theoretic capacity results for a jammed channel correspond to a pure Nash Equilibrium (NE). However, when ...
Physical-layer attacks on chirp-based ranging systems
Chirp signals have been extensively used in radar and sonar systems to determine distance, velocity and angular position of objects and in wireless communications as a spread spectrum technique to provide robustness and high processing gain. Recently, ...
BANA: body area network authentication exploiting channel characteristics
Wireless body area network (BAN) is a promising technology for real-time monitoring of physiological signals to support medical applications. In order to ensure the trustworthy and reliable gathering of patient's critical health information, it is ...
Zero reconciliation secret key generation for body-worn health monitoring devices
Wearable wireless sensor devices are key components in the emerging technology of personalized healthcare monitoring. Medical data collected by these devices must be secured, especially on the wireless link to the gateway equipment. However, it is ...
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
In this paper, we report on a new approach for enhancing security and privacy in certain RFID applications whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples of these applications include ...
A privacy-restoring mechanism for offline RFID systems
Authentication protocols are usually designed to face an adversary who is able to tamper with the channel, possibly with the prover, but rarely with the verifier. When considering large-scale RFID applications, e.g., mass transportation or ticketing, ...
Private communication detection: a stochastic approach
Private communication detection (PCD) enables an ordinary network user to discover communication patterns (e.g., call time, length, frequency, and initiator) between two or more private parties. Ordinary users have neither eavesdropping capabilities (...
Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing
In a multi-hop wireless ad hoc network, packet losses are attributed to harsh channel conditions and intentional packet discard by malicious nodes. In this paper, while observing a sequence of packet losses, we are interested in determining whether ...
Security for cyber-physical systems: case studies with medical devices, robots, and automobiles
Today's and tomorrow's emerging technologies and cyber-physical systems have the potential to greatly improve the quality of our lives. Without the appropriate checks and balances, however, these emerging technologies also have the potential to ...
Unsafe exposure analysis of mobile in-app advertisements
In recent years, there has been explosive growth in smartphone sales, which is accompanied with the availability of a huge number of smartphone applications (or simply apps). End users or consumers are attracted by the many interesting features offered ...
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors
Today's smartphones are shipped with various embedded motion sensors, such as the accelerometer, gyroscope, and orientation sensors. These motion sensors are useful in supporting the mobile UI innovation and motion-based commands. However, they also ...
DroidChecker: analyzing android applications for capability leak
While Apple has checked every app available on the App Store, Google takes another approach that allows anyone to publish apps on the Android Market. The openness of the Android Market attracts both benign and malicious developers. The security of the ...
Design of SMS commanded-and-controlled and P2P-structured mobile botnets
Botnets are one of the most serious security threats to the Internet and personal computer (PC) users. Although botnets have not yet caused major outbreaks in the mobile world, with the rapidly-growing popularity of smartphones such as Apple's iPhone ...
Tetherway: a framework for tethering camouflage
The rapidly increasing data usage and overload in mobile broadband networks has driven mobile network providers to actively detect and bill customers who tether tablets and laptops to their mobile phone for mobile Internet access. However, users may not ...
Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection
This paper addresses the hardware Trojan (HT) attacks that impose severe threats to the security and integrity of wireless networks and systems. We first develop HT attack models by embedding a single HT gate in the target design that triggers advanced ...
CHECKER: on-site checking in RFID-based supply chains
Counterfeit detection in RFID-based supply chains aims at preventing adversaries from injecting fake products that do not meet quality standards. This paper introduces CHECKER, a new protocol for counterfeit detection in RFID-based supply chains through ...
Entropy attacks and countermeasures in wireless network coding
Multihop wireless networks gain higher performance by using network coding. However, using network coding also introduces new attacks such as the well-studied pollution attacks and less-studied entropy attacks. Unlike in pollution attacks where an ...
Congestion lower bounds for secure in-network aggregation
In-network aggregation is a technique employed in Wireless Sensor Networks (WSNs) to aggregate information flowing from the sensor nodes towards the base station. It helps in reducing the communication overhead on the nodes in the network and thereby ...
Index Terms
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks




