5th International Conference on
Security and Privacy in Communication Networks
Athens, Greece
September 14–18, 2009
Organized and Sponsored by
Institute for Computer Sciences, Social-Informatics
and Telecommunications Engineering (ICST)
Volume Editors
Yan Chen
Northwestern University, Department of Electrical Engineering
and Computer Science, Robert R. McCormick School
of Engineering and Application Science, 2145 Sheridian Road
Evanston, IL 60208-3118, USA
E-mail: ychen@northwestern.edu
Tassos D. Dimitriou
Athens Information Technology
Markopoulo Ave.
GR-19002, Peania, Greece
E-mail: tdim@ait.edu.gr
Jianying Zhou
Institute for Infocomm Research
1 FusionopolisWay, 21-01
Connexis, South Tower, 138632 Singapore
E-mail: jyzhou@i2r.a-star.edu.sg
Table of Contents
Wireless Network Security
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages 1
Liang Cai, Gabriel Maganis, Hui Zang, and Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs 21
Ioannis Broustis, Konstantinos Pelechrinis, Dimitris Syrivelis,
Srikanth V. Krishnamurthy, and Leandros Tassiulas
Deny-by-Default Distributed Security Policy Enforcement in Mobile
Ad Hoc Networks 41
Mansoor Alicherry, Angelos D. Keromytis, and Angelos Stavrou
Network Intrusion Detection
Baiting Inside Attackers Using Decoy Documents 51
Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo
MULAN: Multi-Level Adaptive Network Filter 71
Shimrit Tzur-David, Danny Dolev, and Tal Anker
Automated Classification of Network Traffic Anomalies 91
Guilherme Fernandes and Philippe Owezarski
Security and Privacy for the General Internet
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets 101
Magdalena Payeras-Capell`a, Maci`a Mut-Puigserver,
Andreu Pere Isern-Dey`a, Josep L. Ferrer-Gomila, and Lloren¸c Huguet-Rotger
On the Security of Bottleneck Bandwidth Estimation Techniques 121
Ghassan Karame, David Gubler, and Srdjan ˇ Capkun
An Eavesdropping Game with SINR as an Objective Function 142
Andrey Garnaev and Wade Trappe
Malware and Misbehavior
Ensemble: Community-Based Anomaly Detection for Popular Applications 163
Feng Qian, Zhiyun Qian, Z. Morley Mao, and Atul Prakash
Using Failure Information Analysis to Detect Enterprise Zombies 185
Zhaosheng Zhu, Vinod Yegneswaran, and Yan Chen
Dealing with Liars: Misbehavior Identification via R´enyi-Ulam Games 207
William Kozma Jr. and Loukas Lazos
Wireless Network Security II, Sensor Networks
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks 228
Toni Perkovi´c, Ivo Stanˇci´c, Luka Maliˇsa, and Mario ˇ Cagalj
Aggregated Authentication (AMAC) Using Universal Hash Functions 248
Wassim Znaidi, Marine Minier, and C´edric Lauradoux
Sec-TMP:
A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN 265
Andrea Gabrielli, Mauro Conti, Roberto Di Pietro, and Luigi V. Mancini
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks 285
Yanjiang Yang, Jianying Zhou, Robert H. Deng, and Feng Bao
Key Management, Credentials, Authentications
User–Centric Identity Using ePassports 296
Martijn Oostdijk, Dirk-Jan van Dijk, and Maarten Wegdam
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems 311
Shucheng Yu, Kui Ren, Wenjing Lou, and Jin Li
Breaking and Building of Group Inside Signature 330
S. Sree Vivek, S. Sharmila Deva Selvi, S. Gopi Nath, and C. Pandu Rangan
Use of ID-Based Cryptography for the Efficient Verification of the
Integrity and Authenticity of Web Resources 340
Thanassis Tiropanis and Tassos Dimitriou
Wireless Network Security III
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks 350
Julien Freudiger, Maxim Raya, and Jean-Pierre Hubaux
An Active Global Attack Model for Sensor Source Location Privacy:
Analysis and Countermeasures 373
Yi Yang, Sencun Zhu, Guohong Cao, and Thomas LaPorta
Rogue Access Point Detection Using Innate Characteristics of the
802.11 MAC 394
Aravind Venkataraman and Raheem Beyah
Secure Multicast, Emerging Technologies
A Novel Architecture for Secure and Scalable Multicast over IP Network 417
Yawen Wei, Zhen Yu, and Yong Guan
Reliable Resource Searching in P2P Networks 437
Michael T. Goodrich, Jonathan Z. Sun, Roberto Tamassia, and
Nikos Triandopoulos
The Frog-Boiling Attack:
Limitations of Anomaly Detection for Secure Network Coordinate Systems 448
Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, and Yongdae Kim
Author Index 459
● Screenshot ●