Security in Emerging Wireless Communication and Networking Systems. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications, Vol 42 - First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14,

von: Jasone Astorga, Tom Dowling, Ratna Dutta, Eduardo Jacok, Jon Matias, Yu-Chih Wei

Springer-Verlag, 2010

ISBN: 9783642115264 , 88 Seiten

Format: PDF

Kopierschutz: Wasserzeichen

Windows PC,Mac OSX für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's

Preis: 49,22 EUR

Mehr zum Inhalt

Security in Emerging Wireless Communication and Networking Systems. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications, Vol 42 - First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14,


 

Preface

5

Organization

6

Table of Contents

7

Session 1 - Session Chair: Nikolaos Preve

8

A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security

9

Introduction

9

Background Work

9

Wireless Information-Theoretic Security

10

Impact of the Propagation Environment

10

Outage Secrecy Capacity

11

The Need for a Closed-Form Expression

11

Closed-Form Expression via Taylor Approximation

11

Error Calculation Based on Outage Probability

12

Error Calculation for “Good” Channel Case

12

Error Calculation for “Bad” Channel Case

14

Behavior of the Closed-Form Expression

15

Conclusions

17

References

17

Enhanced Access Polynomial Based Self-healing Key Distribution

19

Introduction

19

Preliminaries

21

Notational Convention

21

Our Security Model

21

Proposed Scheme

22

Key Distribution

22

Self-healing

23

Security Analysis

24

Performance Analysis

28

Conclusion

29

References

30

Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments

31

Settharam and Rhee PRNG

31

Statistical Analysis of SR-PRNG

33

Cryptanalysis of SR-PRNG

35

Period Evaluation

35

Disclosure of the Internal State

37

Conclusions

39

References

39

Appendix

41

Session 2 - Session Chair: The ofilos Chrysikos

42

RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks

43

Introduction

43

Related Work

44

Identity-Based Anonymity

44

Location and Attributes Based Anonymity

45

Methodology

46

Assumptions

46

R-Anonymity Model

46

Evaluation

49

Tracking of Vehicles

49

Evaluation of Anonymity

50

Simulation

51

Simulation Result

51

Conclusion and Future Work

53

References

53

Integrating Wireless Sensor Networks with Computational Grids

56

Introduction

56

Related Work

57

Design Issues and Challenges

58

Grid APIs for Sensors

58

Network Connectivity and Protocols

58

Scalability

58

Power Management

59

Scheduling

59

Security

59

Availability

60

Quality-of-Service

60

Architecture of Sensor Grid

60

Sensor Grid Organization

60

Sensor Network Connectivity with Grid

61

Sensor Grid Testbed

64

Hardware Setup

64

Testbed Implementation

64

Conclusion

65

References

65

Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos

67

Introduction

67

Kerberos-Based Approach

68

Related Work

69

Proposed Solution

71

The Time Synchronization Problem

71

Authorization Information

72

Obtaining the Service Ticket: The Authorization Decision

73

The Service Access Phase

73

Revocation of User Rights

75

Inter-domain Operation

76

Conclusions

77

References

78

Signalprint-Based Intrusion Detection in Wireless Networks

79

Introduction

79

Related Work

80

Nodeprints Intrusion Detection

81

System Model

81

Design

82

Performance Model

82

Evaluation

85

Experimental Design

85

Treatment Groups

86

Measurements

86

Results

86

Conclusion

89

References

90

Author Index

91