skip to main content
10.1145/941311acmconferencesBook PagePublication PagesmobicomConference Proceedingsconference-collections
WiSe '03: Proceedings of the 2nd ACM workshop on Wireless security
ACM2003 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WiSE03: 2003 ACM Workshop on Wireless Security ( co-located with Mobicom 2003 Conference ) San Diego CA USA 19 September 2003
ISBN:
978-1-58113-769-9
Published:
19 September 2003
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the Second ACM Workshop on Wireless Security (WiSe). This workshop is being organized with the goal of providing a forum for the exciting research in the increasingly important area of wireless security. We also hope that this workshop will bring together wireless networking and security research communities. Such interactions are expected to increase the number and quality of wireless security research.The workshop received 41 paper submissions, and we thank all the authors for submitting their work to the workshop. Ten submissions were accepted as regular papers which will be presented in the paper sessions at the workshop. Due to the time limitations of a one-day workshop, many interesting submissions could not be accepted as regular papers. The program committee, therefore, recommended some of the submissions for inclusion in a poster session. The poster session at the workshop will include four such presentations. We have an excellent program, and we believe that you will enjoy attending the paper and poster presentations.

Skip Table Of Content Section
SESSION: Location
Article
Secure verification of location claims

With the growing prevalence of sensor and wireless networks comes a new demand for location-based access control mechanisms. We introduce the concept of secure location verification, and we show how it can be used for location-based access control. Then,...

Article
Wireless LAN location-sensing for security applications

This paper considers the problem of using wireless LAN location-sensing for security applications. Recently, Bayesian methods have been successfully used to determine location from wireless LAN signals, but such methods have the drawback that a model ...

SESSION: Secure routing
Article
BISS: building secure routing out of an incomplete set of security associations

We investigate secure routing in ad hoc networks in which security associations exist only between a subset of all pairs of nodes. We focus on source routing protocols. We show that to establish secure routes, it is in general not necessary that ...

Article
Rushing attacks and defense in wireless ad hoc network routing protocols

In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many of the proposed routing protocols for ad hoc networks operate in an on-...

Article
Secure data transmission in mobile ad hoc networks

The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly depends on the availability of security provisions, among other factors. In ...

SESSION: Securing wireless applications
Article
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains

In this work we design and implement ESCORT, a backward compatible, efficient, and secure access control system, to facilitate mobile wireless access to secured wireless LANs. In mobile environments, a mobile guest may frequently roam into foreign ...

Article
On securely enabling intermediary-based services and performance enhancements for wireless mobile users

Intermediary-based services and performance optimizations are increasingly being considered, by network service providers, with a view towards offering value-added services and improving the user experience of wireless mobile clients at reduced costs. ...

SESSION: Secure wireless protocols
Article
Alert aggregation in mobile ad hoc networks

In Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs), IDS agents using local detection engines alone may lead to undesirable performance due to the dynamic feature of MANETs. In this paper, we present a nonoverlapping Zone-based ...

Article
An authentication framework for hierarchical ad hoc sensor networks

Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigated. In this paper, we explore the task of providing data and entity ...

Article
On the security of wireless network access with enhancements

The security of the current 3G wireless protocols addresses the problems faced by the 2G systems, in addition to fulfilling the higher 3G security requirements mandated from operating in IP networks as well as voice networks. However, the approach ...

Contributors
  • U.S. Department of Homeland Security
  • Swiss Federal Institute of Technology, Zurich

Recommendations

Acceptance Rates

WiSe '03 Paper Acceptance Rate10of41submissions,24%Overall Acceptance Rate10of41submissions,24%
YearSubmittedAcceptedRate
WiSe '03411024%
Overall411024%