The Community for Technology Leaders
Security and Privacy for Emerging Areas in Communications Networks, International Conference on (2005)
Athens, Greece
Sept. 5, 2005 to Sept. 9, 2005
ISBN: 0-7695-2369-2
TABLE OF CONTENTS
Introduction
Session 1: Insecurity

Implications of Unlicensed Mobile Access (UMA) for GSM security (Abstract)

Sandro Grech , Nokia Networks
Pasi Eronen , Nokia Research Center
pp. 3-12

Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast (Abstract)

Stefano Chessa , Istituto di Scienza e Tecnologie dell?Informazione, Universit`a di Pisa, Pisa, Italy.
Roberto Di Pietro , Istituto di Scienza e Tecnologie dell?Informazione, Pisa, Italy; Universit`a di Roma "La Sapienza", Roma, Italy
Piero Maestrini , Istituto di Scienza e Tecnologie dell?Informazione, Pisa, Italy; Universit`a di Pisa, Roma, Italy
pp. 13-22

Spread-Identity mechanisms for DOS resilience and Security. (Abstract)

Dhananjay S. Phatak , University of Maryland Baltimore County (UMBC)
pp. 23-34

On the Security of Distributed Position Services (Abstract)

Xiaoxin Wu , Purdue University
Cristina Nita-Rotaru , Purdue University
pp. 35-46
Session 2: RFID

Picking Virtual Pockets using Relay Attacks on Contactless Smartcard (Abstract)

Ziv Kfir , Tel Aviv University, ISRAEL.
Avishai Wool , Tel Aviv University, ISRAEL
pp. 47-58

A Lightweight RFID Protocol to protect against Traceability and Cloning attacks (Abstract)

Tassos Dimitriou , Athens Information Technology, Athens, Greece
pp. 59-66

An RFID Distance Bounding Protocol (Abstract)

Markus G. Kuhn , University of Cambridge, UK
Gerhard P. Hancke , University of Cambridge, UK
pp. 67-73

Security and Privacy Issues in E-passports (Abstract)

David Wagner , UC-Berkeley
David Molnar , UC-Berkeley
Ari Juels , RSA Laboratories
pp. 74-88
Session 3: Sensor Networks

Securing Topology Maintenance Protocols for Sensor Networks: (Abstract)

Andrea Gabrielli , Universit`a di Roma "La Sapienza", Rome, Italy
Sanjeev Setia , George Mason University
Sushil Jajodia , George Mason University
Luigi V. Mancini , Universit`a di Roma"La Sapienza", Rome, Italy
pp. 101-112

Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks (Abstract)

Shivakant Mishra , University of Colorado at Boulder
Jing Deng , University of Colorado at Boulder
Richard Han , University of Colorado at Boulder
pp. 113-126
Session 4: Authentication

Improving Cross-domain Authentication overWireless Local Area Networks (Abstract)

Kang G. Shin , University of Michigan
Walid Dabbous , INRIA, France
Hahnsang Kim , INRIA, France
pp. 127-138

Reducing Reauthentication Delay in Wireless Networks (Abstract)

Tuomas Aura , Microsoft Research, Cambridge, UK
Michael Roe , Microsoft Research, Cambridge, UK
pp. 139-148

Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks (Abstract)

Y. Dong , The University of Hong Kong
Victor O. K. Li , The University of Hong Kong
H. W. Go , The University of Hong Kong
S. M. Yiu , The University of Hong Kong
A. F. Sui , The University of Hong Kong
Lucas C. K. Hui , The University of Hong Kong
pp. 149-156

On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing (Abstract)

Roberto Tamassia , Brown University
Seth Proctor , Sun Microsystems Laboratories
Danfeng Yao , Brown University
pp. 157-170
Session 5: Privacy

A Privacy Preserving Reputation System for Mobile Information Dissemination Networks (Abstract)

Marco Voss , Darmstadt University of Technology, Darmstadt, Germany
Max Muhlhauser , Darmstadt University of Technology, Darmstadt, Germany
Andreas Heinemann , Darmstadt University of Technology, Darmstadt, Germany
pp. 171-181

A Privacy Service for Context-aware Mobile Computing (Abstract)

Markus Endler , Departamento de Inform?atica, PUC-Rio
Fernando Ney Nascimento , Departamento de Inform?atica, PUC-Rio
Vagner Sacramento , Departamento de Inform?atica, PUC-Rio
pp. 182-193

A Solution for Wireless Privacy and Payments based on E-cash (Abstract)

Yiannis Tsiounis , Etolian Capital, LP
Aggelos Kiayias , University of Connecticut
pp. 206-218
Short Paper Session 1

Short Paper: Location Privacy with IP Mobility (Abstract)

Rajeev Koodli , Nokia Research Center
Charles E. Perkins , Nokia Research Center
Vijay Devarapalli , Nokia Research Center
Hannu Flinck , Nokia Research Center
pp. 222-224

Short Paper: Fellowship in Mobile Ad hoc Networks (Abstract)

Vijay Varadharajan , Macquarie University, Sydney Australia
Venkatesan Balakrishnan , Macquarie University, Sydney Australia
pp. 225-227

Short Paper: A Secure Interworking Scheme for UMTS-WLAN (Abstract)

Yen-Chieh Ouyang , National Chung-Hsing University, Taiwan, Republic of China
Chung-Hua Chu , National Chung-Hsing University, Taiwan, Republic of China
pp. 228-230

Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks (Abstract)

Karl Seamon , University of Maryland
John S. Baras , University of Maryland
Svetlana Radosavac , University of Maryland
pp. 231-233

Short Paper: Towards a Location-Aware Role-Based Access Control Model (Abstract)

Lijun Yu , Colorado State University
Indrakshi Ray , Colorado State University
pp. 234-236

Short paper: Tri-party TLS Adaptation for Trust Delegation in Home Networks (Abstract)

Dominique SERET , Universit? Ren? Descartes
Hossam AFIFI , Institut National des T?l?communications
Khaled MASMOUDI , Institut National des T?l?communications
Mureed HUSSEIN , Universit? Ren? Descartes
pp. 237-239

Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices (Abstract)

Wassim Itani , American University of Beirut
Ali Chehab , American University of Beirut
Ayman Kayssi , American University of Beirut
pp. 240-242

Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation (Abstract)

Qi Shi , Liverpool John Moores University
Madjid Merabti , Liverpool John Moores University
Bob Askwith , Liverpool John Moores University
David , Llewellyn-Jones , Liverpool John Moores University
pp. 243-248
Session 6: Key Management

A Level Key Infrastructure for Secure and Efficient Group Communication in Wireless Sensor Network (Abstract)

Jyh-How Huang , University of Colorado
Richard Han , University of Colorado
Jason Buckingham , University of Colorado
pp. 249-260

A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems (Abstract)

Mahmoud T. El-Hadidi , Cairo University, Cairo, Egypt
Amir A. Sayegh , McMaster University, Hamilton, Canada
pp. 261-269

An Efficient Key Management Algorithm for Hierarchical Group Communication (Abstract)

Y. Challal , Compiegne University of Technology, France
H. Ragab Hassan , Compiegne University of Technology, France
H. Bettahar , Compiegne University of Technology, France
A. Bouabdallah , Compiegne University of Technology, France
pp. 270-276

A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks (Abstract)

Heribert Baldus , Philips Research Laboratories Aachen
David S?nchez S?nchez , Philips Research Laboratories Aachen
pp. 277-288

A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks (Abstract)

Carl Hartung , University of Colorado at Boulder
Richard Han , University of Colorado at Boulder
Shivakant Mishra , University of Colorado at Boulde
Jing Deng , University of Colorado at Boulder
pp. 289-302
Session 7: Routing

Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks (Abstract)

Mark Leeson , University of Warwick, UK
Roger Green , University of Warwick, U
Ioannis Pavlosoglou , University of Warwick, UK
pp. 303-314

SPINAT: Integrating IPsec into Overlay Routing (Abstract)

Hannes Tschofenig , Siemens, Germany
Jukka Ylitalo , Ericsson Research NomadicLab, Finland
Patrik Salmela , Ericsson Research NomadicLab, Finland
pp. 315-326

On the Survivability of Routing Protocols in Ad Hoc Wireless Networks (Abstract)

Herbert Rubens , Johns Hopkins University
Baruch Awerbuch , Johns Hopkins University
David Holmer , Johns Hopkins University
Cristina Nita-Rotaru , Purdue University
Reza Curtmola , Johns Hopkins University
pp. 327-338

An Extensible Environment for Evaluating Secure MANET (Abstract)

Wenke Lee , Georgia Institute of Technology
Yi-an Huang , Georgia Institute of Technology
Yongguang Zhang , HRL Laboratories, LLC
pp. 339-352
Session 8: Cryptographic Algorithms and Protocols

Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices (Abstract)

Anthony T. Chronopoulos , Univ. of Texas, San Antonio
Cauligi S. Raghavendra , Univ. of Southern California
Caimu Tang , Univ. of Southern California
pp. 353-364

Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher (Abstract)

Ophir Levy , Tel Aviv University, Israel
Avishai Wool , Tel Aviv University, Israel
pp. 365-373

MOTET: Mobile Transactions using Electronic Tickets (Abstract)

Stephen Hailes , University College London
Daniele Quercia , University College London
pp. 374-383
Short Paper Session 2

Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks (Abstract)

Chinya V. Ravishankar , University of California, Riverside
Li Zhou , University of California, Riverside
Jinfeng Ni , University of California, Riverside
pp. 397-399

Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy (Abstract)

Luigi Mancini , Universit`a di Roma "La Sapienza", Italy
Vishwas Patil , Universit`a di Roma "La Sapienza", Italy
Roberto Di Pietro , Universit`a di Roma "La Sapienza", Italy
Antonio Durante , Universit`a di Roma "La Sapienza", Italy
pp. 400-402

Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks (Abstract)

Katrin Hoeper , University of Waterloo, Ontario, Canada
Guang Gong , University of Waterloo, Ontario, Canada
pp. 403-405

Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption (Abstract)

Borko Furht , Florida Atlantic University
Daniel Socek , Florida Atlantic University
Shujun Li , City University of Hong Kong
Spyros S. Magliveras , Florida Atlantic University
pp. 406-407

Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTP (Abstract)

Timothy Tsai , Sun Microsystems
Sachin Garg , Avaya Labs Research
Navjot Singh , Avaya Labs Research
pp. 409-411

Short Paper: Thor - The Hybrid Online Repository (Abstract)

Kent E. Seamons , Brigham Young University
Timothy W. van der Horst , Brigham Young University
pp. 412-414

Short paper: Random IDs for preserving location privacy (Abstract)

Michael Weber , University of Ulm
Stefan Schlott , University of Ulm
Frank Kargl , University of Ulm
pp. 415-417

Short Paper: A Distributed Cross-Layer Intrusion Detection System for Ad Hoc Networks (Abstract)

Yang Li , Stevens Institute of Technology
Hong Man , Stevens Institute of Technology
Yu Liu , Stevens Institute of Technology
pp. 418-420
Author Index

Author Index (PDF)

pp. 425-426
91 ms
(Ver )