ACM WiSec 2008

Accepted Papers

Regular papers

Key Management and Secure Software Updates in Wireless Process Control Environments
Dennis Nilsson (Chalmers University of Technology, SE); Tanya Roosta (UC Berkeley, US); Ulf Lindqvist (SRI International, US); Alfonso Valdes (SRI International, US)

RFID Authentication Protocol for Low-cost Tags
BoYeon Song (Royal Holloway, Univesity of London, UK); Chris Mitchell (Royal Holloway, University of London, UK)

Mitigating Coordinate Attacks against Virtual Coordinate Based Routing in Wireless Sensor Networks
Jing Dong (Purdue University, US); Kurt Ackermann (Purdue University, US); Brett Bavar (Purdue University, US); Cristina Nita-Rotaru (Purdue University, US)

Secure multi-hop network programming with multiple one-way hash chains
Hailun Tan (University of New South Wales, AU); Sanjay Jha (University of New South Wales, AU); Diet Ostry (CSIRO, AU); John Zic (CSIRO,AU); Vijay Sivaraman (University of New South Wales, AU)

Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks
Yi Yang (Pennsylvania State University, US); Min Shao (The Pennsylvania State University, US); Sencun Zhu (The Pennsylvania State University, US); Bhuvan Urgaonkar (Pennsylvania State University, US); Guohong Cao (Pennsylvania State University, US)

Defending against False-Endorsement-based DoS Attacks in Wireless Sensor Networks
Christoph Krauß (TU-Darmstadt, DE); Markus Schneider (Fraunhofer SIT, DE); Claudia Eckert (TU Darmstadt, DE)

Wireless and Physical Security via Embedded Sensor Networks
Michael Ocean (Boston University, US); Azer Bestavros (Boston University, US)

Towards Self-propagate Mal-packets in Sensor Networks
Qijun Gu (Texas State University at San Marcos, US); Rizwan Noorani (Texas state University, US)

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Wireless Sensor Networks
Qi Dong (University of Texas at Arlington, US); Donggang Liu (University of Texas at Arlington, US); Peng Ning (North Carolina State University, US)

A Secure and Resilient WSN roadside architecture for Intelligent Transport Systems
Jens-Matthias Bohli (NEC Laboratories Europe, DE); Alban Hessler (NEC Europe Ltd., DE); Osman Ugus (NEC Europe Ltd., DE); Dirk Westhoff (NEC Europe Ltd., DE)

An Efficient Integrity-Preserving Scheme for Hierarchical Sensor Aggregation
Keith Frikken (Miami University, US)

Anti-jamming Timing Channels for Wireless Networks
Wenyuan Xu (University of South Carolina, US); Wade Trappe (WINLAB, Rutgers University, US); Yanyong Zhang (Rutgers University, US)

Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm, Christian Wegman, Jens B. Schmitt (University of Kaiserslautern, DE)

Attacks on `Time-of-Flight' Distance Bounding Channels
Gerhard Hancke (Royal Holloway,University of London, UK) Markus G. Kuhn (University of Cambridge, UK)

Identifying Unique Devices through Wireless Fingerprinting
Desmond Loh (National University of Singapore, SG); Chia Yuan Cho (DSO National Laboratories, SG); Chung Pheng Tan (DSO National Laboratories, SG); Ri Seng Lee (DSO National Laboratories, SG)

Slede: A Domain-Specific Verification Framework for Sensor Network Security Protocol Implementations
Youssef Hanna (Iowa State University, US); Hridesh Rajan (Iowa State University, US); Wensheng Zhang (Iowa State University, US)

Short papers

Simple and Effective Defense Against Evil Twin Access Points
Volker Roth (FX Palo Alto Laboratory, Inc., US); Wolfgang Polak (FX Palo Alto Laboratory, Inc., US); Eleanor Rieffel (Fuji-Xerox Palo Alto Lab, US); Thea Turner (FX Palo Alto Laboratory, US)

Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks
Mauro Conti (Universita' di Roma La Sapienza, IT); Roberto Di Pietro (Università di Roma Tre, IT); Luigi Mancini (Universita' di Roma "La Sapienza", IT); Alessandro Mei (Sapienza University of Rome, IT)

Wireless Authentication using Remote Passwords
Andrew Harding (Brigham Young University, US); Timothy van der Horst (Brigham Young University, US); Kent Seamons (Brigham Young University, US)

A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks
Zhiguo Wan (Catholic University of Leuven, BE); Bart Preneel (Katholieke Universityiversiteit Leuven, BE)

Body Sensor Network Security: An Identity-Based Cryptography Approach
Chiu Tan (College of William and Mary, US); Haodong Wang (College of William and Mary, US); Sheng Zhong (SUNY Buffalo, US); Qun Li (College of William and Mary, US)

Minimum Node Degree and k-connectivity for Key Predistribution Schemes and Distributed Sensor Networks
Jiang Wu (University of Waterloo, CA); Doug Stinson (University Waterloo, CA)

Active behavioral fingerprinting of wireless devices
Sergey Bratus (Dartmouth College, US); Cory Cornelius (Dartmouth College, US); Daniel Peebles (Dartmouth College, US); David Kotz (Dartmouth College, US)

Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups
Cynthia Kuo (Carnegie Mellon University, US); Ahren Studer (Carnegie Mellon University, US); Adrian Perrig (Carnegie Mellon University, US)

Self-certified Sybil-Free Pseudonyms: Introducing Privacy in Infrastructureless Wireless Networks
Leonardo Martucci (Karlstad University, SE); Markulf Kohlweiss (KU Leuven, BE); Christer Andersson (Combitech, SE); Andriy Panchenko (RWTH Aachen, DE)

Comparison of Innovative Signature Algorithms
Axel Poschmann (Ruhr University of Bochum, DE); Benedikt Driessen (Ruhr-University Bochum, DE)

Note to authors:

Full papers are at most 12 pages and short papers at most 6 pages, both in the ACM conference style. The author instruction for the camera-ready version and copyright form are available at http://www.sheridanprinting.com/typedept/wisec.htm. Authors can contact the publication chair if needed. (See contact information.)

©2007 Peng Ning . All rights reserved.