Workshop Location: University of Washington

A two-day workshop on Information Assurance in Mobile Wireless Networks is being organized under the sponsorship of Army Research Office. It will take place March 3-4, 2004 at the University of Washington, Seattle and is hosted by the Electrical Engineering Department and the Information Assurance center.

Workshop Objective:

The goal of this workshop is to address the challenges in providing information assurance in mobile wireless networks that are resource limited. An important characteristic of these networks is that they are ad hoc in nature and have to collaboratively establish and maintain services reliably which must be available at all times in a hostile environment.  Apart from the inherent vulnerability of the wireless medium, the resource limitations, intermittent connectivity and need for collaborative communication and computing requires innovative solutions to provide security at all levels in these networks.  Unlike the wired networks, which were designed without security in mind from the beginning, we have an opportunity to understand the challenges faced by next generation military wireless networks and start designing secure solutions. The workshop is expected to produce a document listing the existing solutions, on-going problems and future direction. The main theme of the workshop is to identify the emerging problems as well as the hard problems that must be solved as well as what needs to be done to address these problems.

 

The presentations of the attendees are supposed to be tutorial in nature including (but not limited to) the following items:

1.      Area and Problem Background

2.      Existing Results in the Area

3.      On-going Research and Problems

4.      Critical Challenges that were Ignored in Past Work

5.      Future Challenges and Why they are Important

6.      New tools need for addressing Future Challenges

 The areas of interest for this workshop include (but not limited to):

  1. Intrusion Detection
  2. Dealing with Denial of Service Attacks
  3. Designing Fault Tolerant Wireless Networks
  4. Cross-layer Design Approaches
  5. Key Management Protocols
  6. Authentication Protocols
  7. Self-healing, survivable techniques
  8. Resource Efficient Software Techniques
  9. Secure Location Verification
  10. Protocol Verification Techniques and Tools for Wireless Environment

 

How to attend, and what to submit:

If you are interested in attending and presenting, please send your name, title of the talk and an abstract not to exceed one page, indicating the relevance and your background, to the following e-mail addresses: radha@ee.washington.edu, rkrishna@ee.washington.edu.


 

Administrative Contact:

Stephen Keating

keating@ee.washington.edu

(206) 543-8114

 

Ann Fuchs

annf@ee.washington.edu

(206) 543-6515

 

Technical Contact:

Dr. Radha Poovendran

radha@ee.washington.edu

 

 

Last Updated: Feb 13, 2004