Welcome to the ACM Workshop on Wireless Security (WiSe). This workshop is being organized with the goal of providing a forum for the exciting research in the increasingly important area of wireless security. We also hope that this workshop will bring together wireless networking and security research communities. Such interactions are expected to increase research on wireless security.The workshop received 38 paper submissions, and we thank all the authors for submitting their work to the workshop. Ten submissions were accepted as regular papers which will be presented in the paper sessions at the workshop. Due to the time limitations of a one-day workshop, many interesting submissions could not be accepted as regular papers. The program committee, therefore, recommended some of the submissions for inclusion in a poster session. The poster session at the workshop will include six such presentations. We have an excellent program, and we believe that you will enjoy attending the paper and poster presentations.This workshop would not have been possible without the help of many volunteers. We would like to express special thanks to the program committee members and external reviewers for their valuable help in reviewing the paper submissions despite a tight schedule. Guevara Noubir and Mohsen Guizani helped with the publicity for the workshop. The large number of submissions to the workshop are a result of their efforts. Saad Biaz worked hard to get the proceedings ready for publication on time. Yongguang Zhang, in his capacity as the treasurer for the workshop, has been an immense help in keeping track of the workshop budget. Robin Kravets served as the registration chair for the workshop, and ably handled the related issues. This workshop is co-located with MobiCom 2002. We would like to acknowledge the help of MobiCom executive committee members, particularly, Ian Akyildiz, Andrew Campbell, Suresh Singh, Raghupathy Sivakumar, Mehmet Ulema and Taieb Znati.
Securing ad hoc routing protocols
We consider the problem of incorporating security mechanisms into routing protocols for ad hoc networks. Canned security solutions like IPSec are not applicable. We look at AODV[21] in detail and develop a security mechanism to protect its routing ...
Self-organized network-layer security in mobile ad hoc networks
Protecting the network layer in a mobile ad hoc network is an important research topic in wireless security. This paper describes our unified network-layer security solution in ad hoc networks, which protects both routing and packet forwarding ...
An on-demand secure routing protocol resilient to byzantine failures
An ad hoc wireless network is an autonomous self-organizing system ofmobile nodes connected by wireless links where nodes not in directrange can communicate via intermediate nodes. A common technique usedin routing protocols for ad hoc wireless networks ...
Survivable mobile wireless networks: issues, challenges, and research directions
- James P. G. Sterbenz,
- Rajesh Krishnan,
- Regina Rosales Hain,
- Alden W. Jackson,
- David Levin,
- Ram Ramanathan,
- John Zao
In this paper we survey issues and challenges in enhancing the survivability of mobile wireless networks, with particular emphasis on military requirements*. Research focus on three key aspects can significantly enhance network survivability: (i) ...
Secure wireless gateway
Wireless LANs (WLAN), using the IEEE 802.11b standard, have been shown to be inherently insecure. Given the widespread use of this type of WLAN for public and corporate access, it is important to have an "idiot proof" method for securing WLAN from ...
DoS and authentication in wireless public access networks
As WEP has been shown to be vulnerable to multiple attacks, a huge effort has been placed on specifying an access control mechanism to be used in wireless installations. However, properties of the wireless environment have been exploited to perform ...
A distributed monitoring mechanism for wireless sensor networks
In this paper we focus on a large class of wireless sensor networks that are designed and used for monitoring and surveillance. The single most important mechanism underlying such systems is the monitoring of the network itself, that is, the control ...
Using signal processing to analyze wireless data traffic
Experts have long recognized that theoretically it was possible to perform traffic analysis on encrypted packet streams by analyzing the timing of packet arrivals (or transmissions). We report on experiments to realize this possiblity using basic signal ...
Securing IPv6 neighbor and router discovery
When IPv6 Neighbor and Router Discovery functions were defined, it was assumed that the local link would consist of mutually trusting nodes. However, the recent developments in public wireless networks, such as WLANs, have radically changed the ...
Performance analysis of elliptic curve cryptography for SSL
Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key cryptosystem for mobile/wireless environments. Compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
WiSe '03 | 41 | 10 | 24% |
Overall | 41 | 10 | 24% |