Lecture Notes in Computer Science 3313

Similar documents
Lecture Notes in Computer Science 3373

Lecture Notes in Computer Science 6431

Lecture Notes in Computer Science 5000

Lecture Notes in Computer Science 3081

Lecture Notes in Computer Science 5087

Lecture Notes in Computer Science 3657

Lecture Notes in Computer Science 3700

Lecture Notes in Computer Science 5604

Lecture Notes in Computer Science 4621

Lecture Notes in Computer Science 3417

Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 7216

Lecture Notes in Computer Science 2599 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Artificial Intelligence. Lecture Notes in Computer Science

Telecommunication Economics. Selected results of the COST Action ISO605

Lecture Notes in Computer Science 5498

Lecture Notes in Computer Science. Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 4968

Lecture Notes in Computer Science

Lecture Notes in Computer Science

Lecture Notes in Computer Science 4028

Lecture Notes in Computer Science 4129

Lecture Notes in Computer Science 3368

Lecture Notes in Computer Science 3087

Lecture Notes in Computer Science 4765

Communications in Computer and Information Science 85

Demand Response by Decentralized Device Control Based on Voltage Level

Lecture Notes in Computer Science 2500 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 4323

Lecture Notes in Computer Science 2006 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

ICT for the Next Five Billion People

Lecture Notes in Computer Science 7545

Lecture Notes in Computer Science 4170

Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Lecture Notes in Computer Science 10836

Lecture Notes in Computer Science 8290

Lecture Notes in Computer Science

Lecture Notes in Computer Science 9990

MATLAB Guide to Finite Elements

Spatio-Temporal Image Processing

Lecture Notes in Computer Science

Lecture Notes in Computer Science 3469

Lecture Notes in Computer Science 4404

Future-Oriented Technology Analysis

Architecture Design and Validation Methods

Lecture Notes in Computer Science

Lecture Notes in Computer Science 5840

Lecture Notes in Computer Science 3766

Cognitive Systems Monographs

Lecture Notes in Computer Science

Design for Innovative Value Towards a Sustainable Society

Technology Roadmapping for Strategy and Innovation

Lecture Notes in Computer Science

Lecture Notes in Computer Science

Lecture Notes in Computer Science 10790

Advances in Modern Tourism Research

Lecture Notes in Computer Science 10567

Applied Technology and Innovation Management

Lecture Notes in Computer Science

Lecture Notes in Computer Science 4400

StraBer Wahl Graphics and Robotics

SpringerBriefs in Space Development

Lecture Notes in Computer Science 8682

Lecture Notes in Computational Science and Engineering 68

Lecture Notes in Computer Science 9885

Data Assimilation: Tools for Modelling the Ocean in a Global Change Perspective

Health Information Technology Standards. Series Editor: Tim Benson

Lecture Notes in Artificial Intelligence 3396

Springer Series on. Signals and Communication Technology

Founding Editor Martin Campbell-Kelly, University of Warwick, Coventry, UK

Risk-Based Ship Design

ZEW Economic Studies. Publication Series of the Centre for European Economic Research (ZEW), Mannheim, Germany

Lecture Notes in Computer Science 4326

Lecture Notes in Computer Science 8820

Introduction to Computational Optimization Models for Production Planning in a Supply Chain

Matthias Pilz Susanne Berger Roy Canning (Eds.) Fit for Business. Pre-Vocational Education in European Schools RESEARCH

Human-Computer Interaction Series

Acoustic Emission Testing

U. Lindemann (Ed.) Human Behaviour in Design

Application of Evolutionary Algorithms for Multi-objective Optimization in VLSI and Embedded Systems

Lecture Notes in Computer Science 5765

Lecture Notes in Computer Science 4374

Requirements Engineering for Digital Health

Lecture Notes in Computer Science 6957

Lecture Notes in Computer Science 7550

Handbook of Engineering Acoustics

Lecture Notes in Computer Science 6310

Lecture Notes in Computer Science 6409

146 Advances in Polymer Science

Broadband Networks, Smart Grids and Climate Change

Lecture Notes in Computer Science 6958

Enabling Manufacturing Competitiveness and Economic Sustainability

Scientific Data Mining and Knowledge Discovery

3 Forensic Science Progress

Lecture Notes in Computer Science 5440

Information Security and Cryptography

Lecture Notes in Computer Science

Lecture Notes in Computer Science 5560

TECHNOLOGY, INNOVATION, and POLICY 3. Series of the Fraunhofer Institute for Systems and Innovation Research (lsi)

Lecture Notes in Computer Science 1924 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Transcription:

Lecture Notes in Computer Science 3313 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos New York University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Claude Castelluccia Hannes Hartenstein Christof Paar Dirk Westhoff (Eds.) Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004 Heidelberg, Germany, August 6, 2004 Revised Selected Papers 13

Volume Editors Claude Castelluccia INRIA, Unité de Recherche Rhône-Alpes, France E-mail: ccastell@ics.uci.edu Hannes Hartenstein Universität Karlsruhe (TH), Computing Center and Institute of Telematics E-mail: hartenstein@rz.uni-karlsruhe.de Christof Paar Ruhr-Universität Bochum, Communication Security 44780 Bochum, Germany E-mail: cpaar@crypto.rub.de Dirk Westhoff NEC Europe Ltd., Network Laboratories Kurfürsten Anlage 36, 69115 Heidelberg, Germany E-mail: dirk.westhoff@netlab.nec.de Library of Congress Control Number: 2004117659 CR Subject Classification (1998): E.3, C.2, F.2, H.4, D.4.6, K.6.5 ISSN 0302-9743 ISBN 3-540-24396-8 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com Springer-Verlag Berlin Heidelberg 2005 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 11377689 06/3142 543210

Claude Castelluccia, Hannes Hartenstein, Christof Paar, Dirk Westhoff (Eds.) Security in Ad Hoc and Sensor Networks First European Workshop, ESAS 2004 Heidelberg, Germany, August 6-6, 2004

Preface Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmental monitoring or intervehicle communications: there is almost nothing left that is not going to be smart and networked. While a great amount of research has been devoted to the pure networking aspects, ad hoc and sensor networks will not be successfully deployed if security, dependability and privacy issues are not addressed adequately. These issues are very important because ad hoc and sensor networks are usually used for very critical applications. Furthermore, they are very vulnerable because they are, most of the time, deployed in open and unprotected environments. At ESAS 2004, researchers with interests in both networking and security came together to present and discuss the latest ideas and concepts in the design of secure, dependable and privacy-preserving ad hoc and sensor networks. In the keynote speeches, Jean-Pierre Hubaux (EPFL, Switzerland) discussed the challenges of ad hoc network security, and Antonis Galetsas (European Commission, DG Information Society) presented the current and future activities of the European Commission on these topics. Out of 55 high-quality submissions, the program committee selected 17 papers for publication. The program covered the full spectrum of security-related issues, including key distribution and management, authentication, energy-aware cryptographic primitives, anonymity/pseudonymity, secure diffusion, secure P2P overlays and RFIDs. We would like to thank all authors, referees, supporters and workshop participants for making this workshop a successful event. Special thanks to the program committee and further reviewers for their great work and for reviewing the papers in less than 4 weeks. We hope that you will enjoy the ESAS proceedings and your research work will be stimulated. September 2004 Claude Castelluccia Hannes Hartenstein Christof Paar Dirk Westhoff

Committees Program Co-chairs Claude Castelluccia, INRIA, France Christof Paar, University of Bochum, Germany Hannes Hartenstein, University of Karlsruhe, Germany Dirk Westhoff, NEC Europe Ltd., Germany Program Committee Nadarajah Asokan, Nokia, Finland Levente Buttyan, BME-HIT, Hungary Sonja Buchegger, EPFL, Switzerland Claudia Eckert, TU Darmstadt, Germany Stefan Lucks, University of Mannheim, Germany Refik Molva, Eurécom, France Gabriel Montenegro, SunLabs, France Pekka Nikander, Ericsson, Finland Panagiotis Papadimitratos, Cornell University, USA Ahmad-Reza Sadeghi, University of Bochum, Germany Frank Stajano, University of Cambridge, UK Gene Tsudik, UC Irvine, USA Andre Weimerskirch, University of Bochum, Germany Nathalie Weiler, ETH Zuerich, Switzerland Susanne Wetzel, Stevens Institute of Technology, USA Manel Guerrero Zapata, University Pompeu Fabra, Barcelona, Spain

Table of Contents New Research Challenges for the Security of Ad Hoc and Sensor Networks Jean-Pierre Hubaux... 1 Public Key Cryptography in Sensor Networks Revisited Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar... 2 Exploring Message Authentication in Sensor Networks Harald Vogt... 19 Secure Initialization in Single-Hop Radio Networks Miros law Kuty lowski, Wojciech Rutkowski... 31 Some Methods for Privacy in RFID Communication Kenneth P. Fishkin, Sumit Roy, Bing Jiang... 42 Ring Signature Schemes for General Ad-Hoc Access Structures Javier Herranz, Germán Sáez... 54 Linking Ad Hoc Charging Schemes to AAAC Architectures Joao Girao, Bernd Lamparter, Dirk Weshoff, Rui L. Aguiar, Joao P. Barraca... 66 Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei... 82 Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems Seamus Moloney, Philip Ginzboorg... 95 Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH Mark Manulis, Jörg Schwenk... 107 Secure Overlay for Service Centric Wireless Sensor Networks Hans-Joachim Hof, Erik-Oliver Blaß, Martina Zitterbart... 125 IKE in Ad Hoc IP Networking Kaisa Nyberg... 139

VIII Table of Contents Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks Frank Kargl, Andreas Klenk, Stefan Schlott, Michael Weber... 152 A Security Architecture for Mobile Wireless Sensor Networks Stefan Schmidt, Holger Krahn, Stefan Fischer, Dietmar Wätjen... 166 Securely Propagating Authentication in an Ensemble of Personal Devices Using Single Sign-on Prakash Reddy, Eamonn O Brien-Strain, Jim Rowson... 178 Key Management in Wireless Sensor Networks Yann-Hang Lee, Vikram Phadke, Amit Deshmukh, Jin Wook Lee... 190 SDD:Secure Distributed Diffusion Protocol for Sensor Networks Xiaoyun Wang, Lizhen Yang, Kefei Chen... 205 Secure AES Hardware Module for Resource Constrained Devices Elena Trichina, Tymur Korkishko... 215 Author Index... 231