D-SPAN

2010

First International Workshop on Data Security and PrivAcy in wireless Networks

In conjunction with WoWMoM 2010

Monday, June 14, 2010, Montreal, QC, Canada

Submission website: https://cmt.research.microsoft.com/DSPAN2010/

[Welcome]    [Submission]  [Camera Ready Instructions]  [Organization]    [Program]    [Keynote]    [Panel]

Welcome to D-SPAN 2010, the First International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN). The workshop focuses on defining novel problems and developing novel techniques for data security and privacy issues in wireless and mobile networks. With the emergence of data-intensive wireless networks such as wireless sensor networks and data-centric mobile applications such as location-based services, the traditional boundaries between these three disciplines are blurring. This workshop solicits papers from two main categories: (1) papers that consider the security and privacy of data collection, transmission, storage, publishing, and sharing in wireless networks broadly defined, e.g., MANET, cellular, vehicular, ad hoc, cognitive, as well as sensor networks, and (2) papers that use data analytics techniques to address security and privacy problems in wireless networks. The workshop provides a venue for researchers to present new ideas with impact on three communities –wireless networks, databases, and security.

The list of topics includes, but not limited to,

• Fundamental theory of a security network science

• Key exchange, distribution and management in wireless networks

• Location privacy in wireless networks

• Secure data collection and aggregation for wireless sensor networks

• Secure data collection in body-area networks

• Secure data processing in mobile ad-hoc networks (MANET)

• Secure query processing over wireless sensor networks

• Security and privacy of RFID systems

• Security and privacy for data streaming

• Security for cognitive radio networks

• Tradeoffs between Security and Communication Performance

Click here to download the pdf version of the call for papers.

Important dates:

All deadlines are at 5:00pm Pacific Standard Time (GMT-8)

Paper submission:
Thursday, February 18, 2010

Notification:
Monday, March 22, 2010

Camera ready version:
Tuesday, April 20, 2010

Workshop:
Monday, June 14, 2010

Submission

We welcome original, unpublished manuscripts for 6-pages papers inclusive of all references and figures. Papers should report completed results. Vision papers and descriptions of work-in-progress are also welcomed as short paper submissions (4 pages). Papers must be written in English, and formatted according to the WoWMoM proceeding format. All accepted papers will appear in the conference proceedings published by the IEEE Computer Society Press. Consequently, each accepted paper needs to have a registration to the conference (no-show will result in exclusion of the paper from the IEEE Digital Library).

Paper submission website: https://cmt.research.microsoft.com/DSPAN2010/.

Camera Ready Instruction

Note: The following information is copied from the main conference site of WoWMoM 2010 (with minor modifications to tailor it to the workshop) for your convenience.

The following must be ensured by April 20, 2010, in order for your paper to be included in the conference proceedings.

•   Please format your paper according to the IEEE conference template. You are allowed 6 pages. One extra page may be purchased with an overlength charge of Euro 100 (USD 150) - paid during registration.

•   The following copyright notice must be placed on the bottom, left-hand side of the first page of each paper: 978-1-4244-7265-9/10/$26.00 © 2010 IEEE. For LaTeX users, please refer to here for instructions (search for "CCC code").

•   Please check the compliance of your camera ready PDF file at IEEE PDF Xpress using Conference ID wowmom2010x. Please forward the confirmation email to salvatore.vanini at supsi.ch.

•   Please submit the camera-ready version (*one PDF file*) by email to nzhang10 at gwu.edu.

•   Please submit the (signed) IEEE Copyright Form by email to nzhang10 at gwu.edu.

•   At least one author must be registered to WoWMoM 2010 with a full registration status.

Organization

Please email dspan2010@ieee.org for any question or comment you may have about the workshop.

General Co-Chairs

•   Sajal K. Das
                Computer Science and Engineering
                The University of Texas at Arlington
                and National Science Foundation
                das at cse.uta.edu

•   Peng Ning
                Computer Science
                North Carolina State University
                Raleigh, NC, USA
                pning at ncsu.edu

Program Co-Chairs

•   Wade Trappe
                Electrical and Computer Engineering
                Rutgers University
                North Brunswick, NJ, USA
                trappe at winlab.rutgers.edu

•   Nan Zhang
                Computer Science
                The George Washington University
                Washington, DC, USA
                nzhang10 at gwu.edu

Keynote and Panel Chair

•   Xiuzhen (Susan) Cheng
                Computer Science
                The George Washington University
                Washington, DC, USA
                cheng at gwu.edu

Program Committee

•   Arati Baliga, Rutgers University, USA

•   Yingying Chen, Stevens Inst of Technology, USA

•   Roberto Di Pietro, University of Rome, Italy

•   Hisato Iwai, Doshisha University, Japan

•   Wenliang (Kevin) Du, Syracuse University, USA

•   Yuguang "Michael" Fang, Univ of Florida, USA

•   Xinwen Fu, Univ of Massachusetts Lowell, USA

•   Loukas Lazos, University of Arizona, USA

•   Heejo Lee, Korea University, Korea

•   Donggang Liu, Univ of Texas at Arlington, USA

•   Wenjing Lou, Worcester Polytechnic Inst, USA

•   Catherine Meadows, Naval Research Lab, USA

•   Radha Poovendran, Univ of Washington, USA

•   Yan Sun, University of Rhode Island, USA

•   Vassilios S. Verykios, Univ of Thessaly, Greece

•   Matthew Wright, Univ of Texas at Arlington, USA

•   Wenyuan Xu, University of South Carolina, USA

•   Bulent Yener, Rensselaer Polytechnic Inst, USA

•   Wei Yu, Towson University, USA

•   Sencun Zhu, The Pennsylvania State Univ, USA

Program

8:30-8:45

Welcome

8:45-10:00

Session 1: Keynote (Chair: Nan Zhang)

Assessment of the True Risks to the Protection of Confidential Information in the Wireless Home and Office Environment
Keynote Speaker: Michel Barbeau (Carleton University)

10:00-10:30

Coffee Break

10:30-12:00

Session 2: Wireless Security in Home and Work Environments (Chair: TBD)

Generic Network Forensic Data Acquisition from Household and Small Business Wireless Routers
Zhongli Liu (University of Massachusetts, Lowell), Yinjie Chen (University of Massachusetts, Lowell), Wei Yu (Towson University), Xinwen Fu (University of Massachusetts, Lowell)

A Secure Peer-to-Peer Web Framework
Joakim Koskela (Helsinki Institute for Information Technology), Andrei Gurtov (Helsinki Institute for Information Technology)

Tradeoffs between Security and Communication Performance in Wireless Mesh Networks
Reza Curtmola (New Jersey Institute of Technology), Jing Dong (Purdue University), Cristina Nita-Rotaru (Purdue University)

12:00-13:30

Lunch

13:30-15:00

Session 3: Wireless Security in Specialized Networks (Chair: Reza Curtmola)

Detecting Blackhole Attacks in Disruption-Tolerant Networks through Packet Exchange Recording
Yanzhi Ren (Stevens Institute of Technology), Mooi Choo Chuah (Lehigh University), Jie Yang (Stevens Institute of Technology), Yingying Chen (Stevens Institute of Technology)

Reactive On-board Regulation of Cognitive Radios
Yu Zhang (Rutgers University), Arati Baliga (Rutgers University), Wade Trappe (Rutgers University)

Towards Securing MintRoute in Wireless Sensor Networks
Islam Hegazy (University of Calgary), Reihaneh Safavi-Naini (University of Calgary), Carey Williamson (University of Calgary)

A Vision of Cooperation Tools for VANETs
Jezabel Molina-Gil (University of La Laguna), Cándido Caballero-Gil (University of La Laguna), Pino Caballero-Gil (University of La Laguna)

15:00-15:30

Coffee Break

15:30-17:50

Panel on Cyber Security

Topic: Security for Emerging Cyberphysical and Pervasive Computing Systems

Moderator: Sajal K. Das (US National Science Foundation and University of Texas at Arlington)

Panelists:
Nabil Adam (US Department of Homeland Security)
Kevin Kwiat (US Air Force Research Lab)
Sharad Mehrotra (University of California, Irvine)
Gustavo de los Reyes (AT&T Security R&D Center)
Reihaneh Safavi-Naini (University of Calgary)
Ty Znati (US National Science Foundation).

Keynote

Title: Assessment of the True Risks to the Protection of Confidential Information in the Wireless Home and Office Environment

Speaker: Michel Barbeau, Professor of Computer Science, Carleton University

Dr.Michel Barbeau is a professor of Computer Science. He got a Bachelor, a Master’s and a Ph.D., in Computer Science, from Universite de Sherbrooke, Canada (’85), for undergraduate studies, and Universite de Montreal, Canada (’87 & ’91), for graduate studies. From ’91 to ’99, he was a professor at Universite de Sherbrooke. During the ’98-’99 academic year, he was a visiting researcher at the University of Aizu, Japan. Since 2000, he works at Carleton University, Canada. Wireless communications has been his main research interest. He focuses his efforts on wireless security, vehicular communications, wireless access network management, ad hoc networks and RFID.


Abstract: The ubiquity of wireless communications, in the home and office environment, introduces information security risks specific to WLANs and handheld devices. It is crucial to continuously monitor their evolution but every threat must be examined in terms of potential impact and likelihood. Only when both conditions are present, it does need to be mitigated. This paper shows how the problem can be addressed in a methodological manner. By conducting a proper risk assessment we can identify the threats, to the security of wireless communications, that are real and the ones that are inoffensive. Examples related to the protection of confidential information, in the wireless home and office environment, are used to illustrate the point.

Panel on Cyber Security

Topic: Security for Emerging Cyberphysical and Pervasive Computing Systems

Moderator: Sajal K. Das, National Science Foundation and University of Texas at Arlington, USA


Dr. Sajal K. Das is a University Distinguished Scholar Professor of Computer Science and Engineering and the Founding Director of the Center for Research in Wireless Mobility and Networking (CReWMaN) at the University of Texas at Arlington. He is currently a Program Director at the US National Science Foundation (NSF) in the Division of Computer Networks and Systems. His research interests include wireless and sensor networks, mobile and pervasive computing, smart environments, pervasive security and privacy, resource and mobility management in wireless networks, mobile grid computing, social networks, applied graph theory and game theory. He has published over 400 papers and over 35 invited book chapters, holds 5 US patents, and coauthored two books: "Smart Environments: Technology, Protocols, and Applications" (Wiley, 2005) and "Mobile Agents in Distributed Computing and Networking (Wiley, 2010). Dr. Das is a recipient of the IEEE Computer Society Technical Achievement Award (2009) for pioneering contributions to sensor networks, IEEE Region 5 Outstanding Engineering Educator Award (2008), Lockheed Martin Teaching Excellence Award (2009), UTA academy of Distinguished Scholars Award (2006), and several best paper awards. He serves as the Founding Editor-in-Chief of Elsevier's Pervasive and Mobile Computing (PMC) journal, and as Associate Editor of IEEE Transactions on Mobile Computing, ACM/Springer Wireless Networks, Journal of Parallel and Distributed Computing, and Journal of Peer-to-Peer Networking. Dr. Das is the (co)founder of IEEE WoWMoM and IEEE PerCom conferences. He is a senior member of the IEEE.


Panelists:

Nabil Adam, Department of Homeland Security, USA


Dr. Nabil R. Adam serves as a Fellow and Sr. Program Manager at the US Department of Homeland Security (DHS) – Infrastructure & Geophysical Division (IGD), Science & Technology Directorate where he manages the Complex Event Modeling, Simulation, and Analysis (CEMSA) program. He also serves as the technical lead for the Unified Incident Command & Decision Support System program and has initiated the Cyber-physical Systems Security program. Dr. Adam is a Professor of Computers and Information Systems at Rutgers University; the Founding Director of the Rutgers University Center for Information Management, Integration and Connectivity (CIMIC); and the Director of the recently established information Technology for Emergency mAnageMent (i-TEAM) Research Laboratory. He has published numerous technical papers covering such topics as information management, information security and privacy, data mining, Web services and modeling & simulation. He has co-authored/co-edited ten books. He is the co-founder and the Executive-Editor-in-Chief of the International Journal on Digital Libraries and serves on the editorial board of the Journal of Management Information Systems and the Journal of Electronic Commerce. Dr. Adam's research has been supported by the Department of Homeland Security (DHS), the National Science Foundation (NSF), the National Security Agency (NSA), National Oceanic and Atmospheric Administration (NOAA), the U.S. Environmental Protection Agency (DLA), the National Library of Medicine, the New Jersey Meadowlands Commission, and NASA.


Kevin Kwiat, Air Force Research Lab, USA


Dr. Kevin A. Kwiat has been a civilian employee with the U.S. Air Force Research Laboratory in Rome, New York for over 27 years. He received the BS in Computer Science and the BA in Mathematics from Utica College of Syracuse University, and the MS in Computer Engineering and the Ph.D. in Computer Engineering from Syracuse University. He holds 3 patents. In addition to his duties with the Air Force, he is an adjunct professor of Computer Science at the State University of New York at Utica/Rome, an adjunct instructor of Computer Engineering at Syracuse University, and a Research Associate Professor with the University at Buffalo. He completed assignments as an adjunct professor at Utica College of Syracuse University, a lecturer at Hamilton College, a visiting scientist at Cornell University, and as a visiting researcher while on sabbatical at the University of Edinburgh. His main research interest is dependable computer design.


Sharad Mehrotra, University of California, Irvine, USA


Sharad Mehrotra is a Professor in the School of Information and Computer Science at University of California, Irvine and Director of the Center for Emergency Response Technologies (CERT) at UCI. Mehrotra's current research focuses on building sentient spaces using multimodal sensors, data privacy, and data quality. Mehrotra's recent research, particularly, in the context of CERT has focused on situational awareness from multimodal input including conversational speech data. Many of his research contributions have been incorporated into software artifacts which are now in use at various first responder partner sites. Mehrotra's research expertise is in data management and distributed systems areas in which he has made many pioneering contributions including the concept of "database as a service" and "use of information retrieval techniques, particularly relevance feedback, in multimedia search". He is the recepient of numerous best paper awards including the prestigious SIGMOD best paper award in 2001 for a paper entitled "Locally Adaptive Dimensionality Reduction for Indexing Large Time Series Databases".


Gustavo de los Reyes, AT&T Security R&D Center, USA


Dr. Gustavo de los Reyes is a Director of Technology Security in the AT&T Chief Security Office (CSO). Gus leads the AT&T Security R&D Team under the AT&T Chief Security Officer -- Ed Amoroso. The Security R&D Team is responsible for looking ahead at both the threat and opportunity landscape in AT&T’s priority services such as Mobility, Video, and Cloud Computing. Previously, Gus had responsibility for defining the security architecture and security requirements for key AT&T IP Services such as AT&T Business and Consumer VoIP Services. Gus has been with AT&T Labs (formerly AT&T Bell Labs) for 22 years. He has contributed to AT&T in the areas of robust design, service delivery, and photonic development. Gus has a PhD in Electrical Engineering from Columbia University. He has a BSME and MSE from MIT. Before joining AT&T, Gus designed control systems for General Electric Aircraft Engines.


Reihaneh Safavi-Naini, University of Calgary, Canada


Dr. Rei Safavi-Naini is the iCORE Chair in Information Security and co-director of Centre for Information Security and Cryptography at the University of Calgary, Canada. Before joining University of Calgary in 2007, she was a Professor of Computer Science and the Director of Telecommunication and Information Technology Research Institute (now ICT Research Institute) at the University of Wollongong Australia. She is associate editor of IEEE Transaction on Information Theory and ACM Transactions on Information and System Security, has served on the program committee of major conferences in cryptology and information security. Her research interest includes cryptography, network security, and digital and privacy rights management. She holds a PhD in Electrical Engineering from University of Waterloo, Canada.


Ty Znati, Division Director, CISE/CNS, National Science Foundation, USA


Dr. Znati received a Ph.D. degree in Computer Science from Michigan State University in 1988, and a M.S. degree in Computer Science from Purdue University, in 1984. He is a Professor in the Department of Computer Science at the University of Pittsburgh, with a joint appointment in Telecommunications in the Department of Information Science, and a joint appointment in Computer Engineering at the School of Engineering. He currently serves as the Director of the Computer and Network Systems Division at the National Science Foundation. Dr. Znati also served as a Senior Program Director for networking research at the National Science Foundation. In this capacity, Dr. Znati led the Information Technology Research (ITR) Initiative, a cross-directorate research program, and served as the Chair of ITR Committee.


Dr. Znati's current research interests focus on the design and analysis of evolvable, secure and resilient network architectures and protocols for wired and wireless communication networks. He is a recipient of several research grants from government agencies and from industry. He is frequently invited to present keynotes in networking and distributed conferences both in the United States and abroad.

Dr. Znati currently serves as the General Chair of GlobeCom 2010. He also served as the general chair of IEEE INFOCOM 2005, the general chair of SECON 2004, the first IEEE conference on Sensor and Ad Hoc Communications and Networks, the general chair of the Annual Simulation Symposium, and the general chair of the Communication Networks and Distributed Systems Modeling and Simulation Conference. He is a member of the Editorial Board of the International Journal of Parallel and Distributed Systems and Networks, the Pervasive and Mobile Computing Journal, the Journal on Wireless Communications and Mobile Computing, and Wireless Networks, the Journal of Mobile Communication, Computation and information. He was also a member of the editorial board of the Journal on Ad-Hoc Networks, and a member of IEEE Transactions of Parallel and Distributed Systems.