COMMUNICATION SECURITY SYMPOSIUM

 

Symposium Chair: Victor K. Wei, CUHK, Hong Kong
Vice-chair: Yile Guo, Nokia, USA

Tuesday, 2:00 pm - 5:00 pm
Session SC-1 Room C3

"Denial-of-Service Attacks"

SC1-1
Analysis of Denial-of-Service Attacks on Denial-of-Service Defensive Measures

Bao-Tung Wang, Henning Schulzrinne, Columbia University, USA
SC1-2
Design of Detection System against the Denial of Service Attack in 3G1x System

Junghun Park, Fang Liu, C.-C. Jay Kuo, University of Southern California, USA
SC1-3
On the Effectiveness of Martian Address Filtering and Its Extensions

Hyogon Kim, Inhye Kang, University of Seoul, Korea
SC1-4
An Efficient Filter for Denial-of-Service Bandwidth Attacks

Samuel Abdelsayed, David Glimsholt, Christopher Leckie, The University of Melbourne, Australia, Simon Ryan, Telstra Research Laboratories, Australia, Samer Shami, The University of Melbourne, Australia
SC1-5
Detecting Reflector Attacks by Sharing Beliefs

Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao, The University of Melbourne, Australia
SC1-6
Defeating Distributed Denial-of-Service Attack with Deterministic Bit Marking

Yoohwan Kim, Case Western Reserve University, USA, Ju-Yeon Jo, California State University, Sacramento, USA, Frank L. Merat, Case Western Reserve University, USA
SC1-7
Reducing the Scope of Denial of Service Attacks in QoS Routing

Munirul Islam, Johnson Thomas, Oklahoma State University, USA, Vijay Varadharajan, Macquerie University, Australia
SC1-8
Accommodating Fragmentation in Deterministic Packet Marking for IP Traceback

Andrey Belenky, Nirwan Ansari, NJIT, USA


Wednesday, 9:00 am - 12:00 pm
Session SC-2 Room C3

"Authentication"

SC2-1
RBWA: An Efficient Random-Bit Window-based Authentication Protocol

Fan Zhao, Yongjoo Shin, S. Felix Wu, University of California, Davis, USA, Henric Johnson, Arne Nilsson, Blekinge Institute of Technology, Sweden
SC2-2
A Lightweight Authentication Protocol for Access Control in IEEE 802.11

Haoli Wang, Aravind Velayutham, Yong Guan, Iowa State University, USA
SC2-3
Mutual Authentication Method for Ubiquitous Service Environments

Minoru Matsumoto, Yasushi Takagi, Nippon Telegraph and Telephone Corporation, Japan
SC2-4
A Certified E-Mail Protocol Suitable for Mobile Environments

Jung Min Park, Purdue University, USA, Indrajit Ray, Edwin K. P. Chong, Howard Jay Siegel, Colorado State University, USA
SC2-5
Wireless Authentication in Chi-Spaces

Federico Crazzolara, Colorado State University, USA
SC2-6
Pre-Loaded Key Based Multicast and Broadcast Authentication in Mobile Ad-Hoc Networks

Mahalingam Ramkumar, Mississippi State University, USA, Nasir Memon, Polytechnic University, USA
SC2-7
Authentication and Payment Protocol Preserving Location Privacy in Mobile IP

SuGil Choi, Kwangjo Kim, Information and Communications University, Korea
SC2-8
A Secure Public Wireless LAN Access Technique that Supports Walk-up Users

Hui Luo, Paul Henry, AT&T Labs, USA


Wednesday, 2:00 pm - 5:00 pm
Session SC-3 Room C3

"Wireless Security and Intrusion Detection"

SC3-1
Demonstrating Vulnerabilities in Bluetooth Security

Creighton T. Hager, Scott F. Midkiff, Virginia Polytechnic Institute and State University, USA
SC3-2
Security Algorithms in Wireless LAN: Proprietary or non-Proprietary

Ali Bakirdan, Jihad Qaddour, Imran Khan Jalozie, Illinois State University, USA
SC3-3
An Energy-efficient Approach to Securing Tree-zone-based Sensor Networks

Fei Hu, Jason Tillett, Jim Ziobro, Rochester Institute of Technology, USA, Neeraj K. Sharma, Intel Corporation, USA
SC3-4
A Witness-based Approach for Data Fusion Assurance in Wireless Sensor Networks

Wenliang Du, Jing Deng, Syracuse University, USA, Yunghsiang S. Han, National Chi Nan University, Korea, Pramod K. Varshney, Syracuse University, USA
SC3-5
High-Speed ECC based Kerberos Authentication Protocol for Wireless Applications

Ozkan M. Erdem, Oregon State University, USA
SC3-6
Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs

P. Prasithsangaree, P. Krishnamurthy, University of Pittsburgh, USA
SC3-7
Detection of Invalid Routing Announcements in RIP Protocol

Dan Pei, UCLA. USA, Dan Massey, USC/Information Sciences Institute, USA, Lixia Zhang, UCLA. USA
SC3-8
Profiling Cyber Attacks using Alert Regression Profiles

Phoung Yarng, Pradeep K. Ray, University of New South Wales, Australia, Danny Maher, Netstar Networks, Australia


Thursday, 9:00 am - 12:00 pm

Session SC-4 Room C3

"Group Key Management & Encryption"

SC4-1
Increasing the Robustness of Initial Key Agreement using Failure Detectors

H. Seba, A. Bouabdallah, Université de Technologie de Compiègne, France, N. Badache, USTHB, Algeria
SC4-2
Securing Dynamic Group Membership Information over Multicast: Attacks and Immunization

Yan Sun, K. J. Ray Liu, University of Maryland, USA
SC4-3
Topology-aware Key Management Schemes for Wireless Multicast

Yan Sun, University of Maryland, USA, Wade Trappe, Rutgers University, USA, K. J. Ray Liu, University of Maryland, USA
SC4-4
Mykil: A Highly Scalable Key Distribution Protocol for Large Group Multicast

Jyh-How Huang, Shivakant Mishra, University of Colorado, USA
SC4-5
ISAKMP Handshake for SSL/TLS

Ibrahim Hajjeh, Ahmed Serhrouchni, Ecole Nationale Supérieure des Télécommunications, France, Frédérique Tastet, Thales Communications, France
SC4-6
An Improved Personal CA for Personal Area Networks

Robert H. Deng, Institute for Infocomm Research, Singapore, Feng Bao, Institute for Infocomm Research, Singapore
SC4-7
Simple and Efficient Threshold Cryptosystem from the Gap Diffie-Hellman Group

Joonsang Baek, Monash University, Australia, Yuliang Zheng, UNC Charlotte, USA


Thursday, 2:00 pm - 5:00 pm
Session SC-5 Room C3

"Security Protocols & Architecture"

SC5-1
CITADEL: A Content Protection Architecture for Decentralized Peer-to-Peer File Sharing
Systems
Paul Judge, Mostafa Ammar, Georgia Institute of Technology, USA
SC5-2
The Freiburg Privacy Diamond—A Conceptual Model for Mobility in Anonymity Mechanisms

Alf Zugenmaier, Microsoft Research, UK
SC5-3
High-Level Specification of Security Systems

Javier López, Juan J. Ortega, José M. Troya, University of Malaga, Spain, José Vivas, Hewlett Packard Labs, UK
SC5-4
Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks

Rakesh Babu Bobba, Laurent Eschenauer, Virgil Gligor, William Arbaugh, University of Maryland, USA
SC5-5
An Adaptive Security Model for Mobile Agents in Wireless Networks

Sathish P. Alampalayam, Anup Kumar, University of Louisville, USA
SC05-6
Security Scenarios within IP-based Mobile Multimedia Metropolitan Area Network

Liang Zhang, Gaute Lambertsen, Takahiko Yamada, Ritsumeikan University, Japan
SC5-7
Security Mechanisms for Wireless Home Network

Jianwei Zhuge, Peking University, China, Richard Yao, Microsoft Research Asia, China
SC5-8
IP Mobility Support for IPsec-based Virtual Private Networks: An Architectural Solution

Matteo Berioli, Francesco Trotta, German Aerospace Center, Germany