ACM WiSec 2013


ACM HotWiSec 2013

The 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy
Co-located with ACM WiSec 2013, April 19th, 2013, Budapest, Hungary


  • Towards Viable Certificate-based Authentication for the Internet of Things,
    by Rene Hummen, Jan Henrik Ziegeldorf, Hossein Shafagh, Shahid Raza, Klaus Wehrle

  • Defend Your Home! Jamming Unsolicited Messages in the Smart Home,
    by James Brown, Ibrahim Ethem Bagci, Alex King, Utz Roedig

  • VeSPA: Vehicular Security and Privacy-preserving Architecture,
    by Nikolaos Alexiou, Marcello Lagana, Stylianos Gisdakis, Mohammad Khodaei, Panagiotis Papadimitratos

  • Low-power secret key agreement over OFDM ,
    by Francesco Renna, Nicola Laurenti, Stefano Tomasin, Marco Baldi, Nicola Maturo, Marco Bianchi, Franco Chiaraluce, Matthieu Bloch

  • Spy-Sense: Spyware Tool for Executing Stealthy Exploits against Sensor Networks,
    by Thanassis Giannetsos, Tassos Dimitriou

  • A proactive routing protocol for wireless ad hoc networks assuring some privacy (invited),
    by Jean-Marc Robert, Christophe Bidan

  • Securing Communications Between External Users and Wireless Body Area Networks (invited),
    by Chunqiang Hu, Fan Zhang, Xiuzhen Cheng, Xiaofeng Liao, Dechang Chen

  • DogoIDS: A Mobile and Active Intrusion Detection System for IEEE 802.11s Wireless Mesh Networks (invited),
    by Rodrigo Do Carmo, Matthias Hollick

Call for Papers

Download CfP in PDF!

Theme and Scope

The ACM HotWiSec workshop aims to provide a forum for researchers and practitioners working in the areas of wireless networking, security and privacy to discuss exciting new research directions or out-of-the-box, disruptive or controversial ideas on exploitation or protection of wireless communications and systems. The workshop does not seek fully mature research efforts or papers, which may be more suitable for the main conference. On the contrary, this workshop aims to provide a suitable venue for discussing ideas in their infancy, so as to initiate a lively discussion on the topic and to provide early, useful feedback to the authors. Based on the feedback from this workshop, authors can decide to mature their work and consider submitting it to future ACM WiSec main conferences.

Topics of interest include exciting new ideas in the following areas:

  • Key management in wireless/mobile environments
  • Secure services (neighbor discovery, localization, etc.)
  • Secure PHY and MAC protocols
  • Trust establishment
  • Intrusion, attack and malicious behavior detection
  • Denial of service
  • User and location privacy
  • Anonymity, unobservability, prevention of traffic analysis
  • Identity theft and phishing in mobile networks
  • Charging and secure payment
  • Cooperation and mitigating non-cooperative behavior
  • Economics of wireless security
  • Vulnerability and attack modeling
  • Incentive-aware secure protocol design
  • Jamming/Anti-jamming communication
  • Cross-layer design for security
  • Monitoring and surveillance
  • Cryptographic primitives for wireless communication
  • Theoretical foundations and formal methods for wireless security and privacy
  • Security and privacy of mobile OS and mobile applications
  • Secure delay- and disruption-tolerant networking
  • Secure non-RF wireless communication (e.g., ultrasound, vision, laser)
  • Security/privacy in wireless smart grid and smart metering applications
  • Security/privacy in wireless network coding
  • Security/privacy in wireless/ephemeral social networking
  • Security/privacy in mobile / wireless cloud services

Paper Submission

Manuscript submissions should be in Adobe Portable Document Format (PDF) only. The page limit is 5 pages in the ACM conference style (following the ACM proceeding templates) including all bibliography and well-marked appendices. Font size should be no smaller than 10 points and must fit properly on US "Letter"-sized paper (8.5 x 11 inches). Submitted papers must represent original material that is not currently under review in any other workshop, conference or journal, and has not been published before.

Please submit PDF version of the paper using the workshop easychair paper submission system at All accepted papers will be published in the conference proceedings. At least one author of accepted papers is required to register at the full registration rate, and needs to present the paper at the workshop. Papers from no-shows at the workshop will be excluded from the conference proceedings.

Important Dates

  • Paper submission: extended to December 21, 2012
  • Notification of acceptance: January 20, 2013
  • Camera-ready version: February 15, 2013
  • Conference: April 19, 2013


Workshop Chair

  • Murtuza Jadliwala, Wichita State University, USA

Program Committee

  • Murtuza Jadliwala, Wichita State University, USA (chair)
  • KÚvin Huguenin, EPFL
  • Satyajayant Misra, New Mexico State University
  • Amit Dvir, COMAS, Israel
  • Kui Ren, State University of New York at Buffalo
  • Fan Wu, Shanghai Jiaotong University
  • Prateek Mittal, University of California, Berkeley
  • Eugene Vasserman, Kansas State University
  • Yingying Chen, Stevens Institute of Technology
  • Gergely Acs, INRIA, France
  • Reza Curtmola, New Jersey Institute of Technology, USA
  • Sonja Buchegger, KTH Royal Institute of Technology, Sweden

©2013 ACM WiSec. All rights reserved.