By Topic

First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)

5-9 Sept. 2005

Filter Results

Displaying Results 1 - 25 of 60
  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks - Title

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks - Table of contents

    Publication Year: 2005, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2005, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (20 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Co-Chairs

    Publication Year: 2005, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (18 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2005, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2005, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (15 KB)
    Freely Available from IEEE
  • Implications of Unlicensed Mobile Access (UMA) for GSM security

    Publication Year: 2005, Page(s):3 - 12
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Despite its imperfections, GSM security has stood well the test of time. In part, this security success has relied on closed platforms that prevent the end-user from tampering with the GSM protocol stacks. While it is possible to build phones that do not have such restrictions, this is difficult due to, e.g., legislation and technical complexity. Unlicensed Mobile Access (UMA) is a new technology ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computation, Memory and Bandwidth Efficient Distillation Codes to Mitigate DoS in Multicast

    Publication Year: 2005, Page(s):13 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    In this paper we address the problem of Denial of Service (DoS) mitigation in multicast environment. The contribution of the paper is twofold: first, we introduce an optimization (PMT) on the Merkle tree distillation codes by leveraging the implicit redundancy of a Merkle tree representation. Second, we devise a new algorithm(CECInA) for encoding/decoding that mitigates DoS attacks on the end user... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spread-Identity mechanisms for DOS resilience and Security.

    Publication Year: 2005, Page(s):23 - 34
    Cited by:  Papers (2)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    The explosive growth in wireless (and wired) networking technologies and services indicates that multiple means of network connectivity will become available in the near future. For example, stationary and mobile hosts currently support Internet access via wired LANs, Wireless LANs/PANs (e.g., 802.11x, 802.15) or wide area wireless cellular phone and data networks (like GSM). In essence, heterogen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Security of Distributed Position Services

    Publication Year: 2005, Page(s):35 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    In this paper we analyze the security vulnerabilities of positionbased routing protocols and virtual home region (VHR)-based distributed position service systems. We propose methods to protect the position information from both external and internal attackers. We then discuss and propose several mitigation mechanisms against position abuse by internal attackers that exploit the position service to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Picking Virtual Pockets using Relay Attacks on Contactless Smartcard

    Publication Year: 2005, Page(s):47 - 58
    Cited by:  Papers (32)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    A contactless smartcard is a smartcard that can communicate with other devices without any physical connection, using Radio-Frequency Identifier (RFID) technology. Contactless smartcards are becoming increasingly popular, with applications like credit-cards, national-ID, passports, physical access. The security of such applications is clearly critical. A key feature of RFID-based systems is their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Lightweight RFID Protocol to protect against Traceability and Cloning attacks

    Publication Year: 2005, Page(s):59 - 66
    Cited by:  Papers (125)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    RFID identification is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to yield great productivity gains or “smart” applications for users. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. In this work we present an RFID authentication protocol that enforces user privacy and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An RFID Distance Bounding Protocol

    Publication Year: 2005, Page(s):67 - 73
    Cited by:  Papers (87)  |  Patents (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Radio-frequency identification tokens, such as contactless smartcards, are vulnerable to relay attacks if they are used for proximity authentication. Attackers can circumvent the limited range of the radio channel using transponders that forward exchanged signals over larger distances. Cryptographic distance-bounding protocols that measure accurately the round-trip delay of the radio signal provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and Privacy Issues in E-passports

    Publication Year: 2005, Page(s):74 - 88
    Cited by:  Papers (54)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    Within the next year, travelers from dozens of nations may be carrying a new form of passport in response to a mandate by the United States government. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: Radio-Frequency Identification (RFID) and biometrics. Important in their own right, e-passports are also the harbinger of a wave of n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks

    Publication Year: 2005, Page(s):89 - 100
    Cited by:  Papers (24)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide-range of attacks against control traffic (such as wormholes, Sybil attacks, rushing attacks, etc). In this paper we propose a lightweight protocol called DICAS that mitigate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Topology Maintenance Protocols for Sensor Networks:

    Publication Year: 2005, Page(s):101 - 112
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintenance protocols for sensor networks. These protocols aim to increase the lifetime of the sensor network by maintaining only a subset of nodes in an active or awake state. The design of these protocols assumes that the sensor nodes will be deployed in a trusted non-adversarial environment, and does not... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks

    Publication Year: 2005, Page(s):113 - 126
    Cited by:  Papers (67)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    Wireless sensor networks are highly vulnerable to the failure of base stations. An adversary can render a wireless sensor network useless by launching remote, softwarebased attacks or physical attacks on the base stations. This paper addresses the problem of defending a base station against physical attacks by concealing the geographic location of a base station. Typical packet traffic in a sensor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Cross-domain Authentication overWireless Local Area Networks

    Publication Year: 2005, Page(s):127 - 138
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    As mobile users cross the border of two adjacent domains with on-going sessions, their re-authentication causes a significant impact on inter-domain handoff latency as it requires remote contact with the authentication server across domains, making it difficult to employ current authentication protocols. This paper focuses on the cross-domain authentication over wireless local area networks (WLANs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Reauthentication Delay in Wireless Networks

    Publication Year: 2005, Page(s):139 - 148
    Cited by:  Papers (14)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    When a wireless mobile user is moving across a mobile network or between co-operating networks, the network operators often want to verify the user’s access rights before granting service. The security protocol causes a delay in the network access, which may be much longer than the typical delays caused by mobility management. An alternative would be to provide so called optimistic service be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks

    Publication Year: 2005, Page(s):149 - 156
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    In this paper, we propose an architecture for providing distributed Certificate Authority (CA) service in Mobile Ad Hoc Networks (MANET), based on threshold cryptography. We have two major contributions: 1) we make use of the cluster structure to provide CA service, and design a scheme for locating CA server nodes in MANET; 2) we provide a proactive secret share update protocol, which periodically... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing

    Publication Year: 2005, Page(s):157 - 170
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    In ubiquitous computing environments, computing devices may have small storage units and limited bandwidths. A trust management system needs to be efficient in order to keep communication and computation costs low. The trust establishment mechanism needs to be flexible, because credentials are usually scattered at distributed locations. Also, the authorization process needs to be decentralized and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Privacy Preserving Reputation System for Mobile Information Dissemination Networks

    Publication Year: 2005, Page(s):171 - 181
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    In a mobile information dissemination network mobile users, equipped with wireless devices, exchange information in a spontaneous manner whenever they come into communication range. Users have to specify what kind of information they are looking for and what kind of information they can offer. A priori there is no relation between users, literally spoken, they don’t know each other and confid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.