March 30 (Sunday) |
|
5:00pm – 8:00pm | Registration Desk Open |
6:00pm – 8:00pm | Welcome Reception |
Day 1 – March 31 (Monday) |
|
9:00 am – 9:05 am | Opening Remarks V. Gligor, J.-P. Hubaux, and R. Pooveendran |
9:05 am – 10:05 am |
Keynote Talk 1 |
|
RFID Security: In the Shoulder and on the Loading Dock |
10:05 am – 10:30 am |
Coffee Break |
10:30 am – 12:00 pm |
Session 1: Authentication in Wireless Networks |
10:30 – 11:00 |
Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Wireless Sensor Networks |
11:00 – 11:30 |
Defending against False-Endorsement-based DoS Attacks in Wireless Sensor Networks |
11:30 – 11:45 |
Wireless Authentication using Remote Passwords (short paper) |
11:45 – 12:00 |
Comparison of Innovative Signature Algorithms (short paper) |
12:00 pm – 1:30 pm |
Lunch Break |
1:30 pm – 3:00 pm |
Session 2: Device Identification and Privacy |
1:30 pm – 2:00 pm |
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless |
2:00 pm – 2:30 pm |
Identifying Unique Devices through Wireless Fingerprinting |
2:30 pm – 2:45 pm |
Active Behavioral Fingerprinting of Wireless Devices (short paper) |
2:45 pm – 3:00 pm |
A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks (short paper) |
3:00 pm – 3:30 pm |
Coffee Break |
3:30 pm – 5:00 pm |
Session 3: Sensor Network Security |
3:30 pm – 4:00 pm |
Efficient Integrity-Preserving Scheme for Hierarchical Sensor Aggregation |
4:00 pm – 4:30 pm |
Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks |
4:30 pm – 5:00 pm |
Mitigating Coordinate Attacks against Virtual Coordinate Based Routing in Wireless Sensor Networks |
Day 2 – April 1 (Tuesday) |
|
8:30 am – 10:00 am |
Session 4: Key Management |
8:30 – 9:00 |
Key Management and Secure Software Updates in Wireless Process Control Environments |
9:00 – 9:30 |
Slede: A Domain-Specific Verification Framework for Sensor Network |
9:30 – 9:45 |
Minimum Node Degree and k-connectivity for Key Predistribution Schemes and Distributed Sensor Networks (short paper) |
9:45 – 10:00 |
Mind Your Manners: Socially Appropriate Wireless Key Establishment for Groups (short paper) |
10:00 am – 10:30 am |
Coffee Break |
10:30 am – 12:00 pm |
Session 5: RFID and Embedded Sensors |
10:30 – 11:00 |
Wireless and Physical Security via Embedded Sensor Networks |
11:00 – 11:30 |
RFID Authentication Protocol for Low-cost Tags |
11:30 – 11:45 |
Body Sensor Network Security: An Identity-Based Cryptography Approach (short paper) |
11:45 – 12:00 |
Self-certified Sybil-Free Pseudonyms: Introducing Privacy in Infrastructureless Wireless Networks (short paper) |
12:00 pm – 1:30 pm |
Lunch Break |
1:30 pm – 3:00 pm |
Panel |
|
RFID Security and Privacy: Long-term Research or Short-term Tinkering? |
3:00 pm – 3:30 pm |
Coffee Break |
3:30 pm – 5:00 pm |
Session 6: Multi-hop Applications and Mal-packets |
3:30 pm – 4:00 pm |
A Secure and Resilient WSN Roadside Architecture for Intelligent Transport Systems |
4:00 pm – 4:30 pm |
Towards Self-propagate Mal-packets in Sensor Networks |
4:30 pm – 5:00 pm |
Secure Multi-hop Network Programming with Multiple One-way Hash Chains |
Day 3 – April 2 (Wednesday) |
|
9:00 am – 10:00 am |
Keynote Talk 2 |
|
Synchronizing clocks over wireless networks |
10:00 am – 10:30 am |
Coffee Break |
10:30 am – 12:00 pm |
Session 7: Defensive Techniques |
10:30 am – 11:00 am |
Attacks on `Time-of-Flight' Distance Bounding Channels |
11:00 am – 11:30 pm |
Anti-jamming Timing Channels for Wireless Networks |
11:30 pm – 11:45 pm |
Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks (short paper) |
11:45 pm – 12:00 pm |
Simple and Effective Defense Against Evil Twin Access Points (short paper) |
12:00pm |
END OF EVENT |