[Publicity-list] DIMACS Workshop on Mobile and Wireless Security
Linda Casals
lindac at dimacs.rutgers.edu
Wed Oct 27 12:36:17 EDT 2004
*************************************************
DIMACS Workshop on Mobile and Wireless Security
November 3 - 4, 2004
DIMACS Center, Rutgers University, Piscataway, NJ
Organizers:
Bill Arbaugh, University of Maryland, waa at cs.umd.edu
Presented under the auspices of the Special Focus on Communication
Security and Information Privacy.
************************************************
The rapid growth of both voice and data wireless communications has
resulted in several serious security problems in both the voice and
data spaces. Unfortunately, many of the early security mistakes made
with wireless voice communications were repeated with data
communications, i.e. the use of flawed authentication and
confidentiality algorithms. For example, the standards committee for
802.11 left many of the difficult security issues such as key
management and a robust authentication mechanism as open problems.
This has led many organizations to use either a permanent fixed
cryptographic variable or no encryption with their wireless networks.
Since wireless networks provide an adversary a network access point
that is beyond the physical security controls of the organization,
security can be a problem. Similarly, attacks against WEP, the
link-layer security protocol for 802.11 networks can exploit design
failures to successfully attack such networks. This workshop will
focus on addressing the many outstanding issues that remain in
wireless cellular and WLAN networking such as (but not limited to):
Management and monitoring; ad-hoc trust establishment; secure roaming
between overlay networks; availability and denial of service
mitigation; and network and link layer security protocols. We will
seek to extend work on ad hoc networking from a non-adversarial
setting, assuming a trusted environment, to a more realistic setting
in which an adversary may attempt to disrupt communication. We will
investigate a variety of approaches to securing ad hoc networks, in
particular ways to take advantage of their inherent redundancy
(multiple routes between nodes), replication, and new cryptographic
schemes such as threshold cryptography.
**************************************************************
Workshop Program:
Wednesday, November 3, 2004
9:00 - 10:00 Breakfast and Registration
10:00 - 10:15 Welcome and Overview of Program
Fred Roberts, DIMACS Director
10:15 - 11:00 Wireless Authentication Overview
William Arbaugh
11:00 - 11:45 Role of Authorization in Wireless Network Security
Pasi Eronen, Nokia
11:45 - 12:30 Network Access Control Schemes Vulnerable to
Covert Channels
Florent Bersani
12:30 - 2:00 Lunch
2:00 - 2:45 802.11 Authentication and Keying Requirements
Jesse Walker, Intel
2:45 - 3:30 Secure and Efficient Network Access
Jari Arkko, Ericsson
3:30 - 4:00 Break
4:00 - 5:00 Extending the GSM/3G Key Infrastructure
Scott Guthery, CTO Mobile-Mind, Inc.
5:00 Social Event
Thursday, November 4, 2004
8:30 - 9:00 Breakfast and Registration
9:00 - 9:45 Wireless Security and Roaming Overview
Nidal Aboudagga, UCL
9:45 - 10:30 A Proposal for Next Generation Cellular Network
Authentication and Authorization Architecture
James Kempf, DoCoMo USA Labs
10:30 - 11:00 Break
11:00 - 11:45 Threshold Cryptography and Wireless Roaming
Dan Geer and Moti Yung
11:45 - 12:30 Securing Wireless Localization
Zang Li, Rutgers
12:30 - 2:00 Lunch
2:00 - 3:30 Discussion Period- how to move forward, hard problems?
William Arbaugh
3:30 Closing
**************************************************************
Registration:
Pre-registration deadline: October 27, 2004
Please see website for registration information.
*********************************************************************
Information on participation, registration, accomodations, and travel
can be found at:
http://dimacs.rutgers.edu/Workshops/MobileWireless/
**PLEASE BE SURE TO PRE-REGISTER EARLY**
********************************************************************
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list