Skip to main content
  • Conference proceedings
  • © 2007

Security and Privacy in Ad-hoc and Sensor Networks

4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4572)

Part of the book sub series: Computer Communication Networks and Telecommunications (LNCCN)

Conference series link(s): ESAS: European Workshop on Security in Ad-hoc and Sensor Networks

Conference proceedings info: ESAS 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

  2. Device Pairing

    1. The Martini Synch: Joint Fuzzy Hashing Via Error Correction

      • Darko Kirovski, Michael Sinclair, David Wilson
      Pages 16-30
    2. Private Handshakes

      • Jaap-Henk Hoepman
      Pages 31-42
    3. Security Associations in Personal Networks: A Comparative Analysis

      • Jani Suomalainen, Jukka Valkonen, N. Asokan
      Pages 43-57
  3. Key Management

    1. Key Establishment in Heterogeneous Self-organized Networks

      • Gelareh Taban, Rei Safavi-Naini
      Pages 58-72
    2. Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes

      • Leif Uhsadel, Axel Poschmann, Christof Paar
      Pages 73-86
    3. Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying

      • Johann van der Merwe, Dawoud Dawoud, Stephen McDonald
      Pages 87-100
  4. Location Verification and Location Privacy

    1. Distance Bounding in Noisy Environments

      • Dave Singelée, Bart Preneel
      Pages 101-115
    2. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs

      • Levente Buttyán, Tamás Holczer, István Vajda
      Pages 129-141
  5. Secure Routing and Forwarding

    1. “End-by-Hop” Data Integrity

      • Stephen Farrell, Christian D. Jensen
      Pages 142-155
    2. Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences

      • Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert
      Pages 156-171
  6. Physical Security

    1. Security for Mobile Low Power Nodes in a Personal Area Network by Means of Trusted Platform Modules

      • Ulrich Grossmann, Enrik Berkhan, Luciana C. Jatoba, Joerg Ottenbacher, Wilhelm Stork, Klaus D. Mueller-Glaser
      Pages 172-186
    2. ALGSICS — Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems

      • Neil Bird, Claudine Conrado, Jorge Guajardo, Stefan Maubach, Geert-Jan Schrijen, Boris Skoric et al.
      Pages 187-202
  7. Detection of Compromise, and Revocation

    1. Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques

      • Christoph Krauß, Frederic Stumpf, Claudia Eckert
      Pages 203-217
    2. New Strategies for Revocation in Ad-Hoc Networks

      • Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross Anderson
      Pages 232-246
  8. Back Matter

Other Volumes

  1. Security and Privacy in Ad-hoc and Sensor Networks

About this book

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd shop took place in Cambridge, UK, on the 2 and 3 of July 2007. The workshop was European in name and location but it was de?nitely transatlantic in scope. We had a program chair from Europe and one from the USA, and membership of our program committee was almost evenly split - tween those two regions. When looking at participation, the workshop was even more global than that: the submitted papers came from 25 countries in 6 con- nents. We received 87 submissions. After quick-rejecting 5 papers deemed to be out of scope, the remaining 82 papers were each reviewed by at least three PC members. The two program chairs, who did not submit any works, had sole authoritytodecidewhichpaperstoacceptandreject,basedonlyonthedirective that quality had to be the primary criterion, in order to form a proceedings volume of high international relevance. The number of papers to be accepted was not set in advance: it was selected a posteriori so as to include only solid, innovative and insightful papers. The resulting acceptance rate of about 20%, very strict for a workshop, is a testimonial of how selective we chose to be in accepting only high quality papers.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access