skip to main content
10.1145/2185448acmconferencesBook PagePublication PageswisecConference Proceedingsconference-collections
WISEC '12: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
ACM2012 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WISEC'12: Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks Tucson Arizona USA April 16 - 18, 2012
ISBN:
978-1-4503-1265-3
Published:
16 April 2012
Sponsors:
In-Cooperation:

Bibliometrics
Skip Abstract Section
Abstract

Wireless technologies have had significant impact on how society views computing and communication. Ubiquitous wireless network access has caused a dramatic shift in how we apply network services, moving us ever closer towards the "anytime anywhere" promise of the mobile Internet. However, the same affordability and availability of wireless technologies that make them so attractive also make them an enticing target for security threats.

As a community, we are asked to continuously adapt and expand our definition of "wireless security." Achieving security and privacy over an open broadcast medium using affordable and increasingly programmable wireless devices in an environment where new mobile and social applications are continuously deployed (often without accounting for security into their design) is fraught with challenges. Compounded by the fact that security associations must be made without prior trust relationships, these challenges call for new techniques to address the emergence of new types of threats.

The ACM Conference on Security and Privacy in Wireless and Mobile Networks has been a premier venue for researchers in wireless security and privacy to present the latest research in the field. It has also served as a forum for fostering international collaboration to address eminent security threats faced by our society. Over the years, we have seen an evolution in research, from traditional network security to complex, multi-faceted security problems that cannot be effectively addressed using conventional techniques. In particular, we have witnessed the emergence of new wireless systems (e.g., cognitive radios, RFID, vehicular networks, 4G/WiMax), the widespread deployment of new communication platforms (e.g., smartphones) and of their applications (e.g., social media), as well as an increased awareness of privacy issues associated with these emerging technologies.

The WiSec'12 call-for-papers attracted 63 submissions from Asia, Australia, Europe, and the United States. We saw many exciting papers cross our (virtual) desks, and after a thorough review process (many thanks to the reviewers for their diligence), we arrived at a collection of 17 papers that we felt are mature and ready to be presented to the security community and to be included in the conference proceedings.

The 17 accepted papers can be broadly classified into the following themes:

  • Physical-layer security for wireless systems

  • Privacy in wireless systems

  • Mobile device and application security

  • Supply chain and manufacturing security

  • Foundations of wireless network security

We have chosen to arrange the talks according to these rough topical areas, realizing that such a classification is never perfect and hoping that the authors and the audience appreciate all the talks for their individual and collective merit.

In addition to the research papers being presented at the conference, we also have two exciting keynotes, to be delivered by Dr. Ed Felten, Princeton University and the Federal Trade Commission ("Toward a Healthy Wireless Privacy Ecosystem") and Dr. Tadayoshi Kohno, University of Washington ("Security for Cyber-physical Systems: Case Studies with Medical Devices, Robots, and Automobiles"). We are fortunate to have both speakers, who have made significant contributions to security research at various levels, ranging from foundational contributions in cryptography, to system implementations and hacks, to guiding public policy. In addition to the two keynotes, the program includes two exciting panels, which aim at engaging industry, government, and academia in defining the problem space for security and privacy in wireless and mobile networks. Finally, we have included a poster session, with the goal of encouraging researchers to share their work-in-progress. We sincerely hope that you will take the opportunity to visit these posters and interact with their presenters.

Skip Table Of Content Section
SESSION: Keynote address 1
keynote
Toward a healthy wireless privacy ecosystem

Privacy can be a fraught topic even on traditional desktop systems, and mobility only complicates the issue. Consumers, companies, researchers, and government all want an outcome in which consumers feel safe entrusting their data to mobile technologies, ...

SESSION: Physical layer security for wireless systems
research-article
On the capacity of rate-adaptive packetized wireless communication links under jamming

We formulate the interaction between the communicating nodes and an adversary within a game-theoretic context. We show that earlier information-theoretic capacity results for a jammed channel correspond to a pure Nash Equilibrium (NE). However, when ...

research-article
Physical-layer attacks on chirp-based ranging systems

Chirp signals have been extensively used in radar and sonar systems to determine distance, velocity and angular position of objects and in wireless communications as a spread spectrum technique to provide robustness and high processing gain. Recently, ...

research-article
BANA: body area network authentication exploiting channel characteristics

Wireless body area network (BAN) is a promising technology for real-time monitoring of physiological signals to support medical applications. In order to ensure the trustworthy and reliable gathering of patient's critical health information, it is ...

research-article
Zero reconciliation secret key generation for body-worn health monitoring devices

Wearable wireless sensor devices are key components in the emerging technology of personalized healthcare monitoring. Medical data collected by these devices must be secured, especially on the wireless link to the gateway equipment. However, it is ...

SESSION: Privacy in wireless systems
research-article
Location-aware and safer cards: enhancing RFID security and privacy via location sensing

In this paper, we report on a new approach for enhancing security and privacy in certain RFID applications whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples of these applications include ...

research-article
A privacy-restoring mechanism for offline RFID systems

Authentication protocols are usually designed to face an adversary who is able to tamper with the channel, possibly with the prover, but rarely with the verifier. When considering large-scale RFID applications, e.g., mass transportation or ticketing, ...

research-article
Private communication detection: a stochastic approach

Private communication detection (PCD) enables an ordinary network user to discover communication patterns (e.g., call time, length, frequency, and initiator) between two or more private parties. Ordinary users have neither eavesdropping capabilities (...

research-article
Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing

In a multi-hop wireless ad hoc network, packet losses are attributed to harsh channel conditions and intentional packet discard by malicious nodes. In this paper, while observing a sequence of packet losses, we are interested in determining whether ...

SESSION: Keynote address 2
keynote
Security for cyber-physical systems: case studies with medical devices, robots, and automobiles

Today's and tomorrow's emerging technologies and cyber-physical systems have the potential to greatly improve the quality of our lives. Without the appropriate checks and balances, however, these emerging technologies also have the potential to ...

SESSION: Mobile device and application security
research-article
Unsafe exposure analysis of mobile in-app advertisements

In recent years, there has been explosive growth in smartphone sales, which is accompanied with the availability of a huge number of smartphone applications (or simply apps). End users or consumers are attracted by the many interesting features offered ...

research-article
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors

Today's smartphones are shipped with various embedded motion sensors, such as the accelerometer, gyroscope, and orientation sensors. These motion sensors are useful in supporting the mobile UI innovation and motion-based commands. However, they also ...

research-article
DroidChecker: analyzing android applications for capability leak

While Apple has checked every app available on the App Store, Google takes another approach that allows anyone to publish apps on the Android Market. The openness of the Android Market attracts both benign and malicious developers. The security of the ...

research-article
Design of SMS commanded-and-controlled and P2P-structured mobile botnets

Botnets are one of the most serious security threats to the Internet and personal computer (PC) users. Although botnets have not yet caused major outbreaks in the mobile world, with the rapidly-growing popularity of smartphones such as Apple's iPhone ...

research-article
Tetherway: a framework for tethering camouflage

The rapidly increasing data usage and overload in mobile broadband networks has driven mobile network providers to actively detect and bill customers who tether tablets and laptops to their mobile phone for mobile Internet access. However, users may not ...

SESSION: Supply chain and manufacturing security
research-article
Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection

This paper addresses the hardware Trojan (HT) attacks that impose severe threats to the security and integrity of wireless networks and systems. We first develop HT attack models by embedding a single HT gate in the target design that triggers advanced ...

research-article
CHECKER: on-site checking in RFID-based supply chains

Counterfeit detection in RFID-based supply chains aims at preventing adversaries from injecting fake products that do not meet quality standards. This paper introduces CHECKER, a new protocol for counterfeit detection in RFID-based supply chains through ...

SESSION: Foundations of wireless network security
research-article
Entropy attacks and countermeasures in wireless network coding

Multihop wireless networks gain higher performance by using network coding. However, using network coding also introduces new attacks such as the well-studied pollution attacks and less-studied entropy attacks. Unlike in pollution attacks where an ...

research-article
Congestion lower bounds for secure in-network aggregation

In-network aggregation is a technique employed in Wireless Sensor Networks (WSNs) to aggregate information flowing from the sensor nodes towards the base station. It helps in reducing the communication overhead on the nodes in the network and thereby ...

Contributors
  • The University of Arizona
  • The University of Arizona
  • Hamad Bin Khalifa University
  • Wireless Information Network Laboratory

Index Terms

  1. Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks

          Recommendations

          Acceptance Rates

          Overall Acceptance Rate98of338submissions,29%
          YearSubmittedAcceptedRate
          WiSec '211213428%
          WiSec '16511325%
          WiSec '14962526%
          WiSec '13702637%
          Overall3389829%