Suchen und Finden
Mehr zum Inhalt
Security in Emerging Wireless Communication and Networking Systems. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications, Vol 42 - First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14,
Preface
5
Organization
6
Table of Contents
7
Session 1 - Session Chair: Nikolaos Preve
8
A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security
9
Introduction
9
Background Work
9
Wireless Information-Theoretic Security
10
Impact of the Propagation Environment
10
Outage Secrecy Capacity
11
The Need for a Closed-Form Expression
11
Closed-Form Expression via Taylor Approximation
11
Error Calculation Based on Outage Probability
12
Error Calculation for “Good” Channel Case
12
Error Calculation for “Bad” Channel Case
14
Behavior of the Closed-Form Expression
15
Conclusions
17
References
17
Enhanced Access Polynomial Based Self-healing Key Distribution
19
Introduction
19
Preliminaries
21
Notational Convention
21
Our Security Model
21
Proposed Scheme
22
Key Distribution
22
Self-healing
23
Security Analysis
24
Performance Analysis
28
Conclusion
29
References
30
Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments
31
Settharam and Rhee PRNG
31
Statistical Analysis of SR-PRNG
33
Cryptanalysis of SR-PRNG
35
Period Evaluation
35
Disclosure of the Internal State
37
Conclusions
39
References
39
Appendix
41
Session 2 - Session Chair: The ofilos Chrysikos
42
RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks
43
Introduction
43
Related Work
44
Identity-Based Anonymity
44
Location and Attributes Based Anonymity
45
Methodology
46
Assumptions
46
R-Anonymity Model
46
Evaluation
49
Tracking of Vehicles
49
Evaluation of Anonymity
50
Simulation
51
Simulation Result
51
Conclusion and Future Work
53
References
53
Integrating Wireless Sensor Networks with Computational Grids
56
Introduction
56
Related Work
57
Design Issues and Challenges
58
Grid APIs for Sensors
58
Network Connectivity and Protocols
58
Scalability
58
Power Management
59
Scheduling
59
Security
59
Availability
60
Quality-of-Service
60
Architecture of Sensor Grid
60
Sensor Grid Organization
60
Sensor Network Connectivity with Grid
61
Sensor Grid Testbed
64
Hardware Setup
64
Testbed Implementation
64
Conclusion
65
References
65
Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos
67
Introduction
67
Kerberos-Based Approach
68
Related Work
69
Proposed Solution
71
The Time Synchronization Problem
71
Authorization Information
72
Obtaining the Service Ticket: The Authorization Decision
73
The Service Access Phase
73
Revocation of User Rights
75
Inter-domain Operation
76
Conclusions
77
References
78
Signalprint-Based Intrusion Detection in Wireless Networks
79
Introduction
79
Related Work
80
Nodeprints Intrusion Detection
81
System Model
81
Design
82
Performance Model
82
Evaluation
85
Experimental Design
85
Treatment Groups
86
Measurements
86
Results
86
Conclusion
89
References
90
Author Index
91
Alle Preise verstehen sich inklusive der gesetzlichen MwSt.