Security and Privacy in Ad-hoc and Sensor Networks

4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings

  • Editors
  • Frank Stajano
  • Catherine Meadows
  • Srdjan Capkun
  • Tyler Moore
Conference proceedings ESAS 2007

DOI: 10.1007/978-3-540-73275-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4572)

Table of contents (17 papers)

  1. Front Matter
  2. Device Pairing

    1. The Martini Synch: Joint Fuzzy Hashing Via Error Correction
      Darko Kirovski, Michael Sinclair, David Wilson
      Pages 16-30
    2. Private Handshakes
      Jaap-Henk Hoepman
      Pages 31-42
    3. Security Associations in Personal Networks: A Comparative Analysis
      Jani Suomalainen, Jukka Valkonen, N. Asokan
      Pages 43-57
  3. Key Management

    1. Key Establishment in Heterogeneous Self-organized Networks
      Gelareh Taban, Rei Safavi-Naini
      Pages 58-72
    2. Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes
      Leif Uhsadel, Axel Poschmann, Christof Paar
      Pages 73-86
    3. Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
      Johann van der Merwe, Dawoud Dawoud, Stephen McDonald
      Pages 87-100
  4. Location Verification and Location Privacy

    1. Distance Bounding in Noisy Environments
      Dave Singelée, Bart Preneel
      Pages 101-115
    2. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs
      Levente Buttyán, Tamás Holczer, István Vajda
      Pages 129-141
  5. Secure Routing and Forwarding

    1. “End-by-Hop” Data Integrity
      Stephen Farrell, Christian D. Jensen
      Pages 142-155
    2. Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
      Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert
      Pages 156-171
  6. Physical Security

    1. Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules
      Ulrich Grossmann, Enrik Berkhan, Luciana C. Jatoba, Joerg Ottenbacher, Wilhelm Stork, Klaus D. Mueller-Glaser
      Pages 172-186
    2. ALGSICS — Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
      Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert-Jan Schrijen, Boris Skoric et al.
      Pages 187-202
  7. Detection of Compromise, and Revocation

    1. Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques
      Christoph Krauß, Frederic Stumpf, Claudia Eckert
      Pages 203-217
    2. New Strategies for Revocation in Ad-Hoc Networks
      Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross Anderson
      Pages 232-246
  8. Back Matter

About these proceedings

Introduction

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd shop took place in Cambridge, UK, on the 2 and 3 of July 2007. The workshop was European in name and location but it was de?nitely transatlantic in scope. We had a program chair from Europe and one from the USA, and membership of our program committee was almost evenly split - tween those two regions. When looking at participation, the workshop was even more global than that: the submitted papers came from 25 countries in 6 con- nents. We received 87 submissions. After quick-rejecting 5 papers deemed to be out of scope, the remaining 82 papers were each reviewed by at least three PC members. The two program chairs, who did not submit any works, had sole authoritytodecidewhichpaperstoacceptandreject,basedonlyonthedirective that quality had to be the primary criterion, in order to form a proceedings volume of high international relevance. The number of papers to be accepted was not set in advance: it was selected a posteriori so as to include only solid, innovative and insightful papers. The resulting acceptance rate of about 20%, very strict for a workshop, is a testimonial of how selective we chose to be in accepting only high quality papers.

Keywords

Bluetooth Radio-Frequency Identification (RFID) Routing Signatur Trusted Platform Module ad-hoc networks algorithms authentication cryptographic protocols cryptography intrusion detection networks p2p networks privacy security

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-73274-7
  • Online ISBN 978-3-540-73275-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349