This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005.
The 12 revised full papers presented together with 5 keynote papers and 1 invited paper were carefully reviewed and selected from a total of 33 submissions. The papers address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency (RF) devices.
Author(s): Virgil D. Gligor (auth.), Mike Burmester, Alec Yasinsac (eds.)
Series: Lecture Notes in Computer Science 4074 : Computer Communication Networks and Telecommunications
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 193
Tags: Computer Communication Networks; Data Encryption; Algorithm Analysis and Problem Complexity; Management of Computing and Information Systems; Information Systems Applications (incl.Internet); Communications Engineering, Networks
Front Matter....Pages -
Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networks....Pages 1-1
A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network....Pages 2-13
Key Management for Mobile Sensor Networks....Pages 14-26
Server-Aided RSA Key Generation Against Collusion Attack....Pages 27-37
Hybrid Approach for Secure Mobile Agent Computations....Pages 38-53
An XML Standards Based Authorization Framework for Mobile Agents....Pages 54-66
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results....Pages 67-79
Detecting Impersonation Attacks in Future Wireless and Mobile Networks....Pages 80-95
Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems....Pages 96-109
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks....Pages 110-116
Keynote: Efficient Cryptographic Techniques for Mobile Ad-Hoc Networks....Pages 117-117
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks....Pages 118-131
“Fair” Authentication in Pervasive Computing....Pages 132-143
Cryptanalysis of the Energy Efficient Stream Ciphers SSC2....Pages 144-157
ARMS: An Authenticated Routing Message in Sensor Networks....Pages 158-173
Security Analysis and Improvement of Return Routability Protocol....Pages 174-181
Dark Encounter Computations....Pages 182-185
Panel: Authentication in Constrained Environments....Pages 186-191
Back Matter....Pages -