Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterMay 2019
On the overhead of using zero-knowledge proofs for electric vehicle authentication: poster
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 347–348https://doi.org/10.1145/3317549.3326325As Electric Vehicles (EVs) are becoming widely available, their secure management is crucial to fully enable their potential. For instance, for convenient charging, they may require quick authentication with the charging stations while they are on the ...
- demonstrationMay 2019
Using bluetooth low energy spoofing to dispute device details: demo
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 340–342https://doi.org/10.1145/3317549.3326321In this demo, we will show the effects of multiple Bluetooth Low Energy spoofing attacks, including a novel cache poisoning attack. Bluetooth Low Energy (BLE) is often used for communication between devices, ranging from headphones to medical sensors. ...
- posterMay 2019
Preserving privacy of drone videos using proxy re-encryption technique: poster
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 336–337https://doi.org/10.1145/3317549.3326319Unmanned Aerial Vehicles (UAVs) also known as drones are being used in many applications where they can record or stream video. One of such applications is the Intelligent Transportation Systems (ITS) where drones may need to record videos and send a ...
- posterMay 2019
Performance evaluation of key management schemes for wireless legacy smart grid environments: poster
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 334–335https://doi.org/10.1145/3317549.3326318With the increasing digitization of different components of Smart Grid, there is an ongoing effort to design secure protocols and deploy them for different applications. A major need along with these efforts is to deal with key management for a large ...
- posterMay 2019
Privacy preserving distributed matching for device-to-device IoT communications: poster
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 316–317https://doi.org/10.1145/3317549.3326309Device-to-device (D2D) communication enables machine-type devices (MTD) in Internet-of-Things (IoT) network communicate directly with each other and offload the cellular network. However, it may introduce interference as they share the same spectrum ...
-
- posterMay 2019
Enclave-based privacy-preserving localization: poster
- Joseph I. Choi,
- Dave (Jing) Tian,
- Tyler Ward,
- Kevin R. B. Butler,
- Patrick Traynor,
- John M. Shea,
- Tan F. Wong
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 312–313https://doi.org/10.1145/3317549.3326307In cooperative spectrum sensing, multiple sensors work together to perform tasks such as localizing a target transmitter. However, the exchange of spectrum measurements leads to exposure of the physical location of participating sensors. Furthermore, in ...
- posterMay 2019
Are you secure in your car?: poster
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 308–309https://doi.org/10.1145/3317549.3326305Modern vehicles abound with Electronic Control Units (ECUs) that need to speak with each other. They adopt a binary language and form an in-vehicle network that must be precisely regulated. This was the aim for the inception of "Controller Area Network" ...
- posterMay 2019
RF based entropy sources for jamming resilience: poster
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 300–301https://doi.org/10.1145/3317549.3326300Wireless jamming is a critical challenge for sprawling and ubiquitous devices, which are connected using radio-frequency (RF) waves. Traditionally direct-sequence spread spectrum (DSSS) and its derivatives have been recognized as an effective jamming ...
- demonstrationMay 2019
Wireless attacks on aircraft landing systems: demo
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 295–297https://doi.org/10.1145/3317549.3326298Modern aircraft heavily rely on several wireless technologies for communications, control, and navigation. In this work, we demonstrate the vulnerability of aircraft instrument landing systems to wireless attacks. We show that it is possible to fully ...
- demonstrationMay 2019
Himiko: A human interface for monitoring and inferring knowledge on bluetooth-low-energy objects: demo
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 292–293https://doi.org/10.1145/3317549.3326297The Bluetooth Low Energy (BLE) protocol is being included in a growing number of connected objects such as smartphones, fitness trackers, headphones and smartwatches. As part of the service discovery mechanism of BLE, devices announce themselves by ...
- posterMay 2019
Analyzing endpoints in the internet of things malware: poster
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 288–289https://doi.org/10.1145/3317549.3326295The lack of security measures in the Internet of Things (IoT) devices and their persistent online connectivity give adversaries an opportunity to target them or abuse them as intermediary targets for volumetric attacks such as Distributed Denial-of-...
- research-articleMay 2019
SurFi: detecting surveillance camera looping attacks with wi-fi channel state information
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 239–244https://doi.org/10.1145/3317549.3324928The proliferation of surveillance cameras has greatly improved the physical security of many security-critical properties including buildings, stores, and homes. However, recent surveillance camera looping attacks demonstrate new security threats --- ...
- research-articleMay 2019
LTE security disabled: misconfiguration in commercial networks
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 261–266https://doi.org/10.1145/3317549.3324927Long Term Evolution (LTE) is the de-facto standard for mobile communication. It provides effective security features but leaves room for misunderstandings in its configuration and implementation. In particular, providers face difficulties when ...
- research-articleMay 2019
Lost traffic encryption: fingerprinting LTE/4G traffic on layer two
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 249–260https://doi.org/10.1145/3317549.3323416Long Term Evolution (LTE) provides the communication infrastructure for both professional and private use cases and has become an integral part of our everyday life. Even though LTE/4G overcomes many security issues of previous standards, recent work ...
- research-articleMay 2019
Factors influencing users to use unsecured wi-fi networks: evidence in the wild
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 203–213https://doi.org/10.1145/3317549.3323412Security experts often question why some users take actions that could expose them to security and privacy risks. Using unsecured Wi-Fi networks is one common example. Even though mobile data is now a more secure means to connect to the Internet, and is ...
- research-articleMay 2019
Deployment optimization of IoT devices through attack graph analysis
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 192–202https://doi.org/10.1145/3317549.3323411The Internet of things (IoT) has become an integral part of our life at both work and home. However, these IoT devices are prone to vulnerability exploits due to their low cost, low resources, the diversity of vendors, and proprietary firmware. Moreover,...
- research-articleMay 2019
Scaling pseudonymous authentication for large mobile systems
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 174–184https://doi.org/10.1145/3317549.3323410The central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed pseudonyms. These pseudonyms are used ...
- research-articleMay 2019
Physical layer plausibility checks for misbehavior detection in V2X networks
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 84–93https://doi.org/10.1145/3317549.3323406Location spoofing is a proven and powerful attack against Vehicle-to-everything (V2X) communication systems that can cause traffic congestion and other safety hazards. Recent work also demonstrates practical spoofing attacks that can circumvent ...
- research-articleMay 2019
Thermal covert channel in bluetooth low energy networks
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 267–276https://doi.org/10.1145/3317549.3319730This paper investigates thermal covert channels in the context of the Internet-of-Things. More, precisely we demonstrate such a channel on BLE-enabled devices. We explain how the core design principles of BLE link-layer protocol, combined with well-...
- research-articleMay 2019
Distance bounding under different assumptions: opinion
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile NetworksPages 245–248https://doi.org/10.1145/3317549.3319729Distance-bounding protocols were introduced in 1993 as a countermeasure to relay attacks, in which an adversary fraudulently forwards the communication between a verifier and a distant prover. In the more than 40 different protocols that followed, ...