skip to main content
10.1145/570681acmconferencesBook PagePublication PagesmobicomConference Proceedingsconference-collections
WiSE '02: Proceedings of the 1st ACM workshop on Wireless security
ACM2002 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WiSe02: Workshop on Wireless Security 2002 ( co-located with MobiCom 2002 Conference) Atlanta GA USA 28 September 2002
ISBN:
978-1-58113-585-5
Published:
28 September 2002
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the ACM Workshop on Wireless Security (WiSe). This workshop is being organized with the goal of providing a forum for the exciting research in the increasingly important area of wireless security. We also hope that this workshop will bring together wireless networking and security research communities. Such interactions are expected to increase research on wireless security.The workshop received 38 paper submissions, and we thank all the authors for submitting their work to the workshop. Ten submissions were accepted as regular papers which will be presented in the paper sessions at the workshop. Due to the time limitations of a one-day workshop, many interesting submissions could not be accepted as regular papers. The program committee, therefore, recommended some of the submissions for inclusion in a poster session. The poster session at the workshop will include six such presentations. We have an excellent program, and we believe that you will enjoy attending the paper and poster presentations.This workshop would not have been possible without the help of many volunteers. We would like to express special thanks to the program committee members and external reviewers for their valuable help in reviewing the paper submissions despite a tight schedule. Guevara Noubir and Mohsen Guizani helped with the publicity for the workshop. The large number of submissions to the workshop are a result of their efforts. Saad Biaz worked hard to get the proceedings ready for publication on time. Yongguang Zhang, in his capacity as the treasurer for the workshop, has been an immense help in keeping track of the workshop budget. Robin Kravets served as the registration chair for the workshop, and ably handled the related issues. This workshop is co-located with MobiCom 2002. We would like to acknowledge the help of MobiCom executive committee members, particularly, Ian Akyildiz, Andrew Campbell, Suresh Singh, Raghupathy Sivakumar, Mehmet Ulema and Taieb Znati.

Skip Table Of Content Section
Article
Securing ad hoc routing protocols

We consider the problem of incorporating security mechanisms into routing protocols for ad hoc networks. Canned security solutions like IPSec are not applicable. We look at AODV[21] in detail and develop a security mechanism to protect its routing ...

Article
Self-organized network-layer security in mobile ad hoc networks

Protecting the network layer in a mobile ad hoc network is an important research topic in wireless security. This paper describes our unified network-layer security solution in ad hoc networks, which protects both routing and packet forwarding ...

Article
An on-demand secure routing protocol resilient to byzantine failures

An ad hoc wireless network is an autonomous self-organizing system ofmobile nodes connected by wireless links where nodes not in directrange can communicate via intermediate nodes. A common technique usedin routing protocols for ad hoc wireless networks ...

Article
Survivable mobile wireless networks: issues, challenges, and research directions

In this paper we survey issues and challenges in enhancing the survivability of mobile wireless networks, with particular emphasis on military requirements*. Research focus on three key aspects can significantly enhance network survivability: (i) ...

Article
Secure wireless gateway

Wireless LANs (WLAN), using the IEEE 802.11b standard, have been shown to be inherently insecure. Given the widespread use of this type of WLAN for public and corporate access, it is important to have an "idiot proof" method for securing WLAN from ...

Article
DoS and authentication in wireless public access networks

As WEP has been shown to be vulnerable to multiple attacks, a huge effort has been placed on specifying an access control mechanism to be used in wireless installations. However, properties of the wireless environment have been exploited to perform ...

Article
A distributed monitoring mechanism for wireless sensor networks

In this paper we focus on a large class of wireless sensor networks that are designed and used for monitoring and surveillance. The single most important mechanism underlying such systems is the monitoring of the network itself, that is, the control ...

Article
Using signal processing to analyze wireless data traffic

Experts have long recognized that theoretically it was possible to perform traffic analysis on encrypted packet streams by analyzing the timing of packet arrivals (or transmissions). We report on experiments to realize this possiblity using basic signal ...

Article
Securing IPv6 neighbor and router discovery

When IPv6 Neighbor and Router Discovery functions were defined, it was assumed that the local link would consist of mutually trusting nodes. However, the recent developments in public wireless networks, such as WLANs, have radically changed the ...

Article
Performance analysis of elliptic curve cryptography for SSL

Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key cryptosystem for mobile/wireless environments. Compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster ...

Contributors
  • U.S. Department of Homeland Security
  • Georgetown University

Recommendations

Acceptance Rates

Overall Acceptance Rate10of41submissions,24%
YearSubmittedAcceptedRate
WiSe '03411024%
Overall411024%