Skip to main content
  • Conference proceedings
  • © 2006

Security and Privacy in Ad-Hoc and Sensor Networks

Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4357)

Part of the book sub series: Computer Communication Networks and Telecommunications (LNCCN)

Conference series link(s): ESAS: European Workshop on Security in Ad-hoc and Sensor Networks

Conference proceedings info: ESAS 2006.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (16 papers)

  1. Front Matter

  2. Abstracts of Invited Talks

    1. Security and Cooperation in Wireless Networks

      • Jean-Pierre Hubaux
      Pages 1-2
  3. Regular Papers

    1. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks

      • Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede
      Pages 6-17
    2. Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks

      • Frederik Armknecht, Joao Girao, Marc Stoecklin, Dirk Westhoff
      Pages 18-31
    3. Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks

      • Sepideh Fouladgar, Bastien Mainaud, Khaled Masmoudi, Hossam Afifi
      Pages 32-42
    4. Impact of Pseudonym Changes on Geographic Routing in VANETs

      • Elmar Schoch, Frank Kargl, Tim Leinmüller, Stefan Schlott, Panos Papadimitratos
      Pages 43-57
    5. Identification in Infrastructureless Networks

      • Gina Kounga, Thomas Walter
      Pages 58-69
    6. So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

      • Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore
      Pages 83-97
    7. Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol

      • Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens
      Pages 98-112
    8. On the Wiretap Channel Induced by Noisy Tags

      • Julien Bringer, Hervé Chabanne
      Pages 113-120
    9. Cryptographic Protocol to Establish Trusted History of Interactions

      • Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda
      Pages 136-149
    10. Ad Hoc Security Associations for Groups

      • Jukka Valkonen, N. Asokan, Kaisa Nyberg
      Pages 150-164
    11. Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks

      • Zinaida Benenson, Felix C. Freiling, Birgit Pfitzmann, Christian Rohner, Michael Waidner
      Pages 165-178
  4. Back Matter

Other Volumes

  1. Security and Privacy in Ad-Hoc and Sensor Networks

About this book

Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, Germany, September 20–21, 2006, in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). This year, a total of 44 full papers were submitted to ESAS. Each subm- ted paper was reviewed by at least three expert referees. After a short period of discussion and deliberation, the Program Committee selected 14 papers for presentation and subsequent publication in the workshop proceedings. This c- responds to an acceptance rate of 32% – a respectable rate by any measure. In addition to the presented papers, this year’s workshop also featured two keynote speeches and seven project presentations. In the ?rst keynote, Jean-Pierre Hubaux (EPFL) gave an overview of “Security and Cooperation in WirelessNetworks”.ThesecondkeynotewasgivenbyPimTuyls(Philips)onthe interesting topic of “Grey-Box Cryptography: Physical Unclonable Functions”. The project presentations covered the following European Projects: S3MS, SeVeCom, BIONETS, CASCADAS, MOBIUS, EYES and UbiSecSens. Unf- tunately, the extended abstracts of these presentations could not be included in the proceedings. As the Chairs of ESAS 2006, we are very happy with the outcome of the workshop that clearly demonstrates the continued importance, popularity, and timeliness of the topic: Security and Privacy in Ad Hoc and Sensor Networks.

Keywords

  • Bluetooth
  • Denial of Service
  • Routing
  • ad-hoc networks
  • algorithm
  • algorithms
  • authentication
  • computer network security
  • cryptographic protocols
  • cryptography
  • group communication
  • network security
  • networks
  • privacy
  • security
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Laboratory of Cryptography and System Security (CrySyS), Budapest University of Technology and Economics,  

    Levente Buttyán

  • University of Maryland,  

    Virgil D. Gligor

  • NEC Europe Ltd.,  

    Dirk Westhoff

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions