E-Book, Englisch, Band 42, 88 Seiten
Gu / Astorga / Zang Security in Emerging Wireless Communication and Networking Systems
1. Auflage 2010
ISBN: 978-3-642-11526-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers
E-Book, Englisch, Band 42, 88 Seiten
ISBN: 978-3-642-11526-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September 2009. The workshop emphasizes on new ideas for secure architectures and protocols to enhance the emerging wireless systems. The 7 selected full papers cover topics on applied cryptography, key management, vulnerability analysis, privacy, authentication, and intrusion detection for emerging wireless systems.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;5
2;Organization;6
3;Table of Contents;7
4;Session 1 - Session Chair: Nikolaos Preve;8
4.1;A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security;9
4.1.1;Introduction;9
4.1.1.1;Background Work;9
4.1.1.2;Wireless Information-Theoretic Security;10
4.1.1.3;Impact of the Propagation Environment;10
4.1.2;Outage Secrecy Capacity;11
4.1.2.1;The Need for a Closed-Form Expression;11
4.1.2.2;Closed-Form Expression via Taylor Approximation;11
4.1.3;Error Calculation Based on Outage Probability;12
4.1.3.1;Error Calculation for “Good” Channel Case;12
4.1.3.2;Error Calculation for “Bad” Channel Case;14
4.1.4;Behavior of the Closed-Form Expression;15
4.1.5;Conclusions;17
4.1.6;References;17
4.2;Enhanced Access Polynomial Based Self-healing Key Distribution;19
4.2.1;Introduction;19
4.2.2;Preliminaries;21
4.2.2.1;Notational Convention;21
4.2.2.2;Our Security Model;21
4.2.3;Proposed Scheme;22
4.2.3.1;Key Distribution;22
4.2.3.2;Self-healing;23
4.2.4;Security Analysis;24
4.2.5;Performance Analysis;28
4.2.6;Conclusion;29
4.2.7;References;30
4.3;Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments;31
4.3.1;Settharam and Rhee PRNG;31
4.3.2;Statistical Analysis of SR-PRNG;33
4.3.3;Cryptanalysis of SR-PRNG;35
4.3.3.1;Period Evaluation;35
4.3.3.2;Disclosure of the Internal State;37
4.3.4;Conclusions;39
4.3.5;References;39
4.3.6;Appendix;41
5;Session 2 - Session Chair: The ofilos Chrysikos;42
5.1;RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks;43
5.1.1;Introduction;43
5.1.2;Related Work;44
5.1.2.1;Identity-Based Anonymity;44
5.1.2.2;Location and Attributes Based Anonymity;45
5.1.3;Methodology;46
5.1.3.1;Assumptions;46
5.1.3.2;R-Anonymity Model;46
5.1.4;Evaluation;49
5.1.4.1;Tracking of Vehicles;49
5.1.4.2;Evaluation of Anonymity;50
5.1.4.3;Simulation;51
5.1.5;Simulation Result;51
5.1.6;Conclusion and Future Work;53
5.1.7;References;53
5.2;Integrating Wireless Sensor Networks with Computational Grids;56
5.2.1;Introduction;56
5.2.2;Related Work;57
5.2.3;Design Issues and Challenges;58
5.2.3.1;Grid APIs for Sensors;58
5.2.3.2;Network Connectivity and Protocols;58
5.2.3.3;Scalability;58
5.2.3.4;Power Management;59
5.2.3.5;Scheduling;59
5.2.3.6;Security;59
5.2.3.7;Availability;60
5.2.3.8;Quality-of-Service;60
5.2.4;Architecture of Sensor Grid;60
5.2.4.1;Sensor Grid Organization;60
5.2.4.2;Sensor Network Connectivity with Grid;61
5.2.5;Sensor Grid Testbed;64
5.2.5.1;Hardware Setup;64
5.2.5.2;Testbed Implementation;64
5.2.6;Conclusion;65
5.2.7;References;65
5.3;Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos;67
5.3.1;Introduction;67
5.3.2;Kerberos-Based Approach;68
5.3.3;Related Work;69
5.3.4;Proposed Solution;71
5.3.4.1;The Time Synchronization Problem;71
5.3.4.2;Authorization Information;72
5.3.4.3;Obtaining the Service Ticket: The Authorization Decision;73
5.3.4.4;The Service Access Phase;73
5.3.4.5;Revocation of User Rights;75
5.3.4.6;Inter-domain Operation;76
5.3.5;Conclusions;77
5.3.6;References;78
5.4;Signalprint-Based Intrusion Detection in Wireless Networks;79
5.4.1;Introduction;79
5.4.2;Related Work;80
5.4.3;Nodeprints Intrusion Detection;81
5.4.3.1;System Model;81
5.4.3.2;Design;82
5.4.3.3;Performance Model;82
5.4.4;Evaluation;85
5.4.4.1;Experimental Design;85
5.4.4.2;Treatment Groups;86
5.4.4.3;Measurements;86
5.4.4.4;Results;86
5.4.5;Conclusion;89
5.4.6;References;90
6;Author Index;91




