ACM DL

Privacy and Security (TOPS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Information and System Security (TISSEC), Volume 11 Issue 4, July 2008

Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables
Gildas Avoine, Pascal Junod, Philippe Oechslin
Article No.: 17
DOI: 10.1145/1380564.1380565

Cryptanalytic time-memory trade-offs have been studied for 25 years and have benefited from several improvements since the original work of Hellman. The ensuing variants definitely improve the original trade-off but their real impact has never...

SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
Article No.: 18
DOI: 10.1145/1380564.1380568

Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during the process of data collection in a sensor network. However, because individual sensor readings are...

An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
Svetlana Radosavac, George Moustakides, John S. Baras, Iordanis Koutsopoulos
Article No.: 19
DOI: 10.1145/1380564.1380567

The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology has forced network designers to put emphasis on the importance of ensuring efficient and fair use of network resources. In this work we propose a...

Evaluation of Intrusion Detection Systems Under a Resource Constraint
Young U. Ryu, Hyeun-Suk Rhee
Article No.: 20
DOI: 10.1145/1380564.1380566

An intrusion detection system plays an important role in a firm's overall security protection. Its main purpose is to identify potentially intrusive events and alert the security personnel to the danger. A typical intrusion detection system,...

Using First-Order Logic to Reason about Policies
Joseph Y. Halpern, Vicky Weissman
Article No.: 21
DOI: 10.1145/1380564.1380569

A policy describes the conditions under which an action is permitted or forbidden. We show that a fragment of (multi-sorted) first-order logic can be used to represent and reason about policies. Because we use first-order logic, policies have a...

Attack-Resistant Location Estimation in Wireless Sensor Networks
Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Kevin Du
Article No.: 22
DOI: 10.1145/1380564.1380570

Many sensor network applications require sensors' locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments has been mostly overlooked. Most of the existing localization...

Secure Time Synchronization in Sensor Networks
Saurabh Ganeriwal, Christina Pöpper, Srdjan Čapkun, Mani B. Srivastava
Article No.: 23
DOI: 10.1145/1380564.1380571

Time synchronization is critical in sensor networks at many layers of their design. It enables better duty-cycling of the radio, accurate and secure localization, beamforming, and other collaborative signal processing tasks. These benefits make...