ACM Workshop on Wireless Security (WiSe 2005)
Workshop Program
September 2, 2005
Cologne, Germany
| Friday, September 2, 2005 | |
| 08:30 - 08:40 | WiSe Introduction and Awards | 
| 08:40 - 10:10 | Session 1: Key Management Session Chair: Wenke Lee | 
| 08:40 - 09:10 | 
 Efficient Key Establishment for Group-Based Wireless Sensor Deployments | 
| Li Zhou, Jinfeng Ni, Chinya V. Ravishankar (University of California at Riverside) 
 | |
| 09:10 - 09:40 | Group-Based Key Pre-Distribution in Wireless Sensor Networks | 
| Donggang Liu (University of Texas at Arlington), Peng Ning (NCSU), Wenliang Du (Syracuse University) 
 | |
| 09:40 - 10:10 | Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks | 
| Johann van der Merwe, Dawoud Dawoud, Stephen McDonald (University of KwaZulu) 
 | |
| 10:10 - 10:20 | Coffee Break | 
| 10:20 - 11:20 | 
 Session 2: KEYNOTE TALK Session Chair: Srdjan Capkun 
 | 
| 
 | |
| Professor Jean-Pierre Hubaux, EPFL | |
| 11:20 - 11:30 | Break | 
| 11:30 - 12:30 | Session 3: Misbehavior Session Chair: Loukas Lazos | 
| 11:30 - 12:00 | 
 A Framework for MAC Protocol Misbehavior Detection in Wireless Networks | 
| Svetlana Radosavac (University of Maryland), John S. Baras (University of Maryland), Iordanis Koutsopoulos (University of Thessaly) 
 | |
| 12:00 - 12:30 | Hotspot-Based Traceback for Mobile Ad Hoc Networks | 
| Yi-an Huang and Wenke Lee (Georgia Tech) | |
| 12:30 - 13:30 | Session 4: Poster Presentations Session Chair: Iordanis Koutsopolous | 
| 
 Experimental Comparisons between SAODV and AODV Routing Protocol | |
| Yuxia Lin, A. Hamed Mohsenian Rad, Vincent W.S. Wong, Joo-Han Song (University of British Columbia) 
 | |
| Anonymous On Demand Routing in Mobile Ad hoc Networks | |
| Stefaan Seys and Bart Preneel (K.U.Leuven) 
 | |
| Two Practical Attacks Against Bluetooth Security Using New Enhanced Implementations of Security Analysis Tools | |
| Keijo Haataja (University of Kuopio) | |
| 13:30 - 14:30 | 
 Session 5: KEYNOTE TALK Session Chair: Radha Poovendran 
 | 
| 
 Emergent Properties in Ad-Hoc Networks: A Security Perspective | |
| Professor Virgil D. Gligor, University of Maryland | |
| 14:30 - 14:40 | Break | 
| 14:40 - 16:10 | Session 6: Security Analysis Session Chair: TBA | 
| 14:40 - 15:10 | 
 Privacy Enhanced Cellular Access Security | 
| Geir Myrdahl Koien (Telenor R & D and Agder University College) 
 | |
| 15:10 - 15:40 | Strengthening EPC Tags Against Cloning | 
| Ari Juels (RSA Laboratories) 
 | |
| 15:40 - 16:10 | Modeling Epidemic Spreading in Mobile Environments | 
| James W. Mickens, Brian D. Noble (University of Michigan) | |
| 16:10 - 16:20 | Coffee Break | 
| 16:20 - 17:20 | Session 7: Synchronization Session Chair: Ari Juels | 
| 16:20 - 16:50 | 
 Low-cost Attacks against Packet Delivery, Localization and Time Synchronization Services in Under-Water Sensor Networks | 
| Jiejun Kong (UCLA), Zhengrong Ji (UCLA), Weichao Wang (Purdue University), Mario Gerla (UCLA), Rajive Bagrodia (UCLA), Bharat Bhargava (Purdue University) 
 | |
| 16:50 - 17:20 | Secure Time Synchronization Service for Sensor Networks | 
| Saurabh Ganeriwal, Srdjan Capkun, Chih-Chieh Han, Mani B. Srivastava (UCLA) | |