IWSS - 1st International Workshop on Sensor Security (IWSS)

Former Workshop on Contactless Security - Clessec

In conjunction with ARES 2009 Fukoka, Japan, March 16th-19th 2009

Overview

Contactless proximity Technologies such as Smartcards, Near Field Communication, RFID and Sensors Networks are already part of our everyday life. For the consumer unnoticed and simple to use, they are a popular alternative to conventional communication channels. With the integration of these technologies into everyday devices like mobile phones, possibilities and risks for applications arise. The central aim of this workshop is to bring together users, engineers and researchers (from industry and academy) to discuss and identify security and privacy issues related to sensor technologies and applications on top.

Accpeted Papers

  • NFC and RFID
    • Collin Mulliner. Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones
    • Mohaned KAFI, Sylvain GUILLEY, Sandra MARCELLO, David NACCACHE. Deconvolving Protected Signals
    • Vincent Alimi, Marc Pasquet. Post-distribution provisioning and personalization of a payment application on a UICC-based Secure Element
    • George Poulopoulos, Kostas Markantonakis, Keith Mayes. A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems
  • Ad-hoc Networks and Sensor Networks
    • Hassen Redwan, Ki-Hyung Kim. Security Requirements, Attacks and Network Integration in Wireless Mesh Networks
    • Vegar Westerlund, Thomas Pronstad, Inger Anne Tøndel, Leendert Wienhofen. : Trusting User Defined Context in MANETs: Experience from the MIDAS Approach
    • Thomas DJOTIO NDIE, Claude TANGHA. VeSMNetMon(VeSMp Network Monitor): a VeSMp-based Tool for Network/System remote administration

Topics

Topics related to any of dependability aspects in sensor technologies, applications and systems are of interest. These include, but are not limited to the following areas:

Secure Hardware

  • Secure Hardware for sensor technology
  • In-Device Security of sensor devices
  • Access Control Policies and Permissions for sensor devices and ecosystems
  • Cryptography and Protocols in RFID and NFC Systems

Applications & Infrastructure

  • Security and privacy in sensor applications
  • Security and thread models for sensor systems and infrastructures
  • Reliability, Robustness, Availability and Integrity of sensor applications
  • Secure deployment of mobile sensor applications
  • Ad hoc networks (AHN) and Wireless Sensors Networks (WNS)

Threat and Risk-Models

  • Information Security and Risk Management for contactless systems and processes
  • Encryption & Authentication and secure protocols for contactless technologies and applications
  • Security analysis and methods for evaluation of (implemented) contactless systems and devices

Mobile Trust

  • Security and privacy related to SmartCards, Smartcard Webserver, Multiapplication Smartcards, NFC Devices, WMS, AHN
  • Mobile trusted Modules and secure elements in contactless environments
  • Trusted Computing in the context of contactless technology, AHN and WNS

Important Dates

Submission Deadline: October 15th, Extension of Deadline: November 2nd, 2008
Author Notification: November, 20th 2008
Author Registration: November, 30th 2008
Proceedings Version: December 15th, 2008
Conference/Workshop: March 18th, 2009

Organization

The Workshop is orgainzed by the NFC Research Lab Hagenberg at the University of Applied Sciences of Upper Austria and the Department of Computational Perception at Johannes Kepler University

  • Gerald Madlmayr, Research Associate at NFC Research Lab, Hagenberg
  • Josef Langer, Head of NFC Research Lab, Hagenberg and Professor for Hardware/Software Systems Engineering
  • Josef Scharinger, Professor at the department of Computational Perception

For further question please contact gerald.madlmayr "replace with at-char" fh-hagenberg.at

Program Committee

  • Christian Zeidler, Evolaris (Austria)
  • Collin Mulliner, SIT Fraunhofer (Germany)
  • Ernesto Damiani, Universität Milan (Italy)
  • Florian Michahelles, Auto-ID Labs, ETH Zürich (Switzerland)
  • Gerald Madlmayr, FH OÖ, Campus Hagenberg (Austria)
  • Gerhard Hancke, Royal Holloway, University of London (UK)
  • Josef Langer, NFC Research Lab Hagenberg (Austria)
  • Josef Scharinger, CP, Johannes Kepler University (Austria)
  • Jürgen Fuß, FH OÖ Campus Hagenberg (Austria)
  • Michael Hsu-Chen Cheng, PCCU (Taiwan)
  • Luis F. G. Sarmenta, MIT Boston (MA/USA)
  • Sandra Dominikus, TU Graz (Austria)
  • Nur Aini Rakhmawati, Institut Teknologi Sepuluh Nopember (Indonesia)
  • Rainer Widmann, FH OÖ Campus Wels (Austria)
  • Shokrollahi Jamshid, Bosch (Germany)
  • Thomas de Lazzari, Nice/Sophie Antipolis (France)
  • Enrico Rukzio, Lanchester University (UK)
  • Massimo Paolucci, NTT DoCoMo EuroLabs (Germany)
  • Daniel Oranova Siahaan, Institut Teknologi Sepuluh Nopember (Indonesia)
  • René Hüsler, HTA Luzern (Switzerland)
  • Ersin Uzun, UC Irvine (CA/USA)
  • Frederik Schrooyen, Hogeschool Antwerpen (Belgium)
  • Maarten Weyn, Hogeschool Antwerpen (Belgium)
  • Fusheng Wang, SCR Princeton (NJ/USA)
  • Geylani Kardas, EGE University (Turkey)
  • Gina Kounga, NTT DoCoMo EuroLabs (Germany)
  • Piotr Cofta, British Telecom (UK)
  • Pim Tuyls, Philips Corporate Technologies (Belgium)
  • Jarno Salonen, VTT Technical Research Center of Finland (Finland)
  • Ernst Haselsteiner, NXP Semiconductors (Austria)
  • Ravikumar G. H., Nokia (India)

Submission Guidlines and Publication

Please upload your paper into our conference management system

Authors are invited to submit research and application papers following the IEEE Computer Society Proceedings Manuscripts style: two columns, single-spaced, including figures and references, using 10 fonts, and number each page. Submission papers must not have more than 6 pages representing original, previously unpublished work. Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition. Contact author must provide the following information for the ARES web site: paper title, authors' names, affiliations, postal address, phone, fax, and e-mail address of the author(s), about 200-250 word abstract, and about five keywords.

For our blind review process, we kindly ask authors to submit anonymized papers only!

Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper in the conference. Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.

Instructions about styles and paper submission can be found here

All accepted papers will be published as ISBN proceedings published by IEEE Computer Society.