ACM Workshop on Wireless Security (WiSe 2006)
Workshop Program
September 29, 2006
Los Angeles, CA, USA
Friday, September 29, 2006 | |
08:30 - 08:40 | WiSe Introduction and Awards |
08:40 - 10:10 |
Session 1: Defensive Techniques Session Chair: Farooq Anjum |
08:40 - 09:10 |
SCUBA: Secure Code Update By Attestation in Sensor Networks |
Arvind Seshadri, Mark Luk and Adrian Perrig (Carnegie Mellon University)
|
|
09:10 - 09:40 | Proactive Security For Mobile Messaging Networks |
Abhijit Bose and Kang G. Shin (Univ. of Michigan)
|
|
09:40 - 10:10 | Using Uncertainty in Reputation Methods to Enforce Cooperation in Ad-Hoc Networks |
Kevin Kane and James C. Browne (University of Texas at Austin) | |
10:10 - 10:20 | Coffee Break |
10:20 - 11:20 |
Session 2: KEYNOTE TALK Session Chair: Ari Juels
|
|
|
Nicholas Tsougas (U.S. Department of Defense AIT Office) | |
11:20 - 11:30 | Break |
11:30 - 12:30 |
Session 3: Radio-Layer Security Session Chair: Srjdan Capkun |
11:30 - 12:00 |
Securing Wireless Systems via Lower Layer Enforcements |
Zang Li, Wenyuan Xu, Rob Miller and Wade Trappe (Rutgers University)
|
|
12:00 - 12:30 | Detecting Identity-Based Attacks in Wireless Networks Using Signalprints |
Daniel Faria and David Cheriton (Stanford University) | |
12:30 - 13:30 |
LUNCH BREAK
|
13:30 - 14:30 |
Session 4: KEYNOTE TALK Session Chair: Radha Poovendran
|
Security in Sensor Networks: Industry Trends, Present and Future Research Directions |
|
Professor Adrian Perrig (Carnegie Mellon University) | |
14:30 - 14:40 | Break |
14:40 - 16:10 |
Session 5: Assessing Vulnerabilities Session Chair: Minyan Li |
14:40 - 15:10 |
Modeling Ad-hoc Rushing Attack in a Negligibility-based Security Framework |
Jiejun Kong, Xiaoyan Hong and Mario Gerla (UCLA)
|
|
15:10 - 15:40 | Traffic Analysis-based Unlinkability Measure for IEEE 802.11b-based Communication Systems |
Dijiang Huang (Arizona State University)
|
|
15:40 - 16:10 | Impact of Paging Channel Overloads or Attacks on a Cellular Network |
Jeremy Serror (ENS), Hui Zang (Sprint) and Jean Bolot (Sprint) | |
16:10 - 16:20 | Coffee Break |
16:20 - 17:50 |
Session 6: Location-Based Techniques Session Chair: Loukas Lazos |
16:20 - 16:50 |
Integrity Regions: Authentication Through Presence in Wireless Networks |
Srdjan Capkun (T.U. Denmark) and Mario Cagalj (EPFL)
|
|
16:50 - 17:20 | Location Privacy in Wireless Personal Area Networks |
Dave Singelee (KU Leuven)
|
|
17:20 - 17:50 | Location dependent key management using random key-predistribution in sensor networks |
Farooq Anjum (Telcordia) |