The 1st Workshop on Unconventional Security for Wireless Communications (USWC)

Recent advances in wireless communications have supported an increasingly interconnected world: from ultra high-throughput and scalable 5G Massive MIMO systems, to batteryless embedded sensor devices capable of running for years on limited or scavenged power. Behind these networks, the revolution in cloud computing has enabled softwarization of services and unprecedented global access to data. Governments and companies are leveraging these technologies in ways that ensure modern wireless communication networks increasingly permeate all aspects of our everyday lives: from managing power grids, to delivering your pizza.

However, despite several recent high-profile cases of industrial espionage and embarrassing public data leaks,  security is still often considered as an afterthought, even as everything from car journeys, to infrastructure monitoring, to delivering your pizza is increasingly automated. Even when security is prioritized, the pace of technological change and inherent novelty of use cases can expose unforeseen weaknesses – sometimes to dire consequences.

The Workshop on Unconventional Security in Wireless Communications (USWC) aims to bring together researchers from fields such as Networking, AI, ML, Telecoms, and Digital Security, and invites them to “think outside the box”. Not only on how wireless communications and networks should, and could, be secured, but how unconventional attacks may circumvent established security dogma. We welcome submissions with unusual takes on existing techniques, proposals for novel security solutions, exposure of atypical weaknesses, and the application of unconventional approaches to solve next-generation wireless security challenges.

Biographies and contact information of the organizers

uscw-michael
Michael Baddeley
michael@ssrc.tii.ae

Michael Baddeley is a Lead Wireless Researcher with the Secure Systems Research Centre (SSRC) at the Technology Innovation Institute (TII) in Abu Dhabi, UAE. His current research focuses on robust wireless communication for ad-hoc and infrastructure-less mesh networks: such as interference mitigation, spectral coexistence, and end-to-end dependability across a mesh-cloud continuum. More information at michaelbaddeley.com.

uswc-Carol-Fung.
Carol Fung
carol.fung@concordia.ca

Carol Fung is an Associate Professor at Concordia University.  She received her Bachelor’s and Master’s degrees in computer science from the University of Manitoba (Canada), and a PhD in computer science from the University of Waterloo (Canada). Her research interests include collaborative security in social networks, mobile systems, and software defined networks. She is the recipient of the Alumni Gold Medal of university of Waterloo in 2013, best dissertation awards in IM2013, the best student paper award in CNSM2011 and the best paper award in IM2009. She received numerous prestige awards and scholarships including Google Anita Borg scholarship, NSERC Postdoc fellowship, David Cheriton Scholarship, NSERC Postgraduate Scholarship, and President's graduate scholarship. She has been a visiting scholar at POSTECH (South Korea), a software engineer intern at Google, and a research intern at BlackBerry.

uswc-Aisha-Kanwal-Junejo
Aisha Kanwal Junejo
a.junejo@imperial.ac.uk

Aisha Kanwal Junejo is a Lecturer (Assistant Professor) in Cyber Security at Keele University. She worked on the security of sensor-based systems as part of the Logistics 4.0 and S4 projects funded by Petras and EPSRC. Her research interests include but are not limited to. the security, privacy, and trust of cyber-physical systems, wireless sensor networks, cloud computing, fog computing, and applied cryptography.

Willian
Willian Tessaro Lunardi
willian@ssrc.tii.ae

Willian Tessaro Lunardi is a Senior Machine Learning Researcher with the Secure Systems Research Centre (SSRC) at the Technology Innovation Institute (TII) in Abu Dhabi, UAE. His current research focuses on deep learning approaches for security.

uswc-Diogo-Menezes-Ferrazani-Mattos
Diogo Menezes Ferrazani Mattos
diogo_mattos@id.uff.br

Diogo Menezes Ferrazani Mattos is a Professor at the School of Engineering at the Fluminense Federal University (UFF), Brazil, in the Department of Telecommunications Engineering. His publications and research interests cover the areas of network security, next-generation networks, virtualization, networks defined by software, and the Internet of the future.

uswc-Martin-Andreoni-Lopez
Martin Andreoni Lopez
martin@ssrc.tii.ae

Martin Andreoni Lopez is Lead Security Researcher with the Secure Systems Research Centre (SSRC) at the Technology Innovation Institute (TII) in Abu Dhabi, UAE. Author of several publications and patents in the area of security, virtualization, traffic analysis and Big Data.

TimeActivity
09:00 - 09:10 (CEST)  Opening Remarks
  Chair: Michael Baddeley
09:10 - 10:00 (CEST)Keynote: Utz Roedig "Authentication in the Digital World"
  Chair: Michael Baddeley
10:00 - 10:30 (CEST)Coffee Break
10:30 - 12:00 (CEST)

  Session 1 (Unconventional Security)
  Chair: Pericle Perazzo

  • NB-IoT Battery Depletion via Malicious Interference – Vlad Ionescu and Utz Roedig
  • Securing Synchronous Flooding Communications: An Atomic-SDN Implementation – Charles Lockie, Ioannis Mavromatis, Aleksandar Stanoev, Yichao Jin, and George Oikonomou
  • Towards Secure Multicast Ranging with Ultra-Wideband Systems – Michael Stocker, Jan Kowalczyk, Carlo Alberto Boano, and Kay Roemer
12:00 - 13:00 (CEST)Lunch Break
13:00 - 14:30 (CEST)

  Session 2 (Security and Privacy)
  Chair: Martin Andreoni

  • IoT Key Exchange Performance Analysis – Francesco Raimondo, Ufuk Erol, Samuel Gunner, James Pope, Robert Zakrzewski, Mike Faulks, Ryan McConville, Thomas Pasquier, Rob Piechocki, and George Oikonomou
  • Wake Word Based Room Identification with Personal Voice Assistants - Mohammadreza Azimi, Utz Roedig
  •  Post-Quantum Attribute-Based Encryption: Performance Evaluation and Improvement for Embedded Systems - Pericle Perazzo, Michele La Manna, Francesco Iemma
14:30 - 15:00 (CEST)Coffee Break
15:00 - 15:30 (CEST)

  Session 3 (Invited Talk)
  Chair: Martin Andreoni

  • Network Anomaly Detection - Willian Lunardi
15:30 - 16:30 (CEST)Closing Remarks + Open Discussion
  Chair: Pericle Perazzo

UWSC 2022: Call for Papers

Recent advances in wireless communications have supported an increasingly interconnected world: from ultra high-throughput and scalable 5G Massive MIMO systems, to batteryless embedded sensor devices capable of running for years on limited or scavenged power. Behind these networks, the revolution in cloud computing has enabled softwarization of services and unprecedented global access to data. Governments and companies are leveraging these technologies in ways that ensure modern wireless communication networks increasingly permeate all aspects of our everyday lives: from managing power grids, to delivering your pizza.

Unfortunately, despite several recent high-profile cases of industrial espionage and embarrassing public data leaks,  security is still often considered as an afterthought, even as everything from car journeys, to infrastructure monitoring, to delivering your pizza is increasingly automated. Even when security is prioritized, the pace of technological change and inherent novelty of use cases can expose unforeseen weaknesses – sometimes to dire consequences.

The Workshop on Unconventional Security in Wireless Communications (USWC) aims to bring together researchers from fields such as Networking, AI, ML, Telecoms, and Digital Security, and invites them to “think outside the box”. Not only on how wireless communications and networks should, and could, be secured, but how unconventional attacks may circumvent established security dogma. We welcome submissions with unusual takes on existing techniques, proposals for novel security solutions, exposure of atypical weaknesses, and the application of unconventional approaches to solve next-generation wireless security challenges.

UWSC provides a venue for researchers from diverse backgrounds to apply novel technologies and techniques in unusual and surprising ways – whether to solve current challenges, or expose inherent weaknesses. Above all, UWSC aims to be a forum for lively discussion and engaged debate on past, present, and future of communication security in an interconnected world.

 

Call for Papers

We invite researchers and practitioners from academia and industry to submit papers (up to 6 pages, double-column) focusing on topics such as:

  • Wireless security for cyber-physical systems (e.g., factory automation).
  • Wireless security for critical infrastructures (e.g., healthcare, smartgrid).
  • AI / Machine Learning for malware and attack detection at the network layer.
  • AI / Machine Learning assisted security and privacy, at the physical, MAC, or networking layers.
  • Security protocols for wireless communications and networking.
  • RF Jamming attacks and defenses for wireless networks.
  • Localization and positioning privacy (GPS, UWB, BLE 5.2, etc.).
  • Physical tracking security and privacy.
  • Ultra low-power security for RF backscatter.
  • Side-channel and fault attacks on multi-radio devices (e.g., LTE/Wi-Fi/BLE chipsets).
  • Side-channel attacks on IoT devices (e.g., Dolphin Attack)
  • Security and possible weaknesses in 6G cellular networks (3GPP, ETSI, IEEE, etc.).
  • Reverse engineering of and tampering with wireless communications.
  • Testbed and experimental platforms for wireless security.
  • Resilience and dependability for wireless networks.
  • Vehicular networks security (e.g., drones, automotive, avionics, autonomous driving).
  • Security for UAV swarms (i.e., distributed, highly-mobile systems).
  • Key management (agreement or distribution) for highly-mobile networks.
  • Wireless network security in satellite systems.
  • NFC and smart payment applications.
  • Cryptography primitives and lightweight protocols for embedded IoT devices.
  • Reconfigurable Intelligent Surfaces (RIS).
  • Physical Unclonable Functions (PUFs).
  • Theoretical and formal approaches for wireless security.
  • Internet of the Things  (IoT) security.
  • Mobile Security.
  • Cellular communication security.
  • Adversarial Machine Learning and Unlearning for wireless communication.
  • Smart Contracts and Blockchain for wireless communication.

In following with the theme of this workshop, we especially encourage submissions which aim to broaden the discussion outside of traditional security challenges and approaches. Examples could include, but are not limited to:

  • Bio-inspired security solutions.
  • Visual/movement-based security solutions.
  • Security techniques based on multi-modal sensor fusion.
  • Underwater communications security.
  • Visual Light Communication (VLC)-based security.
  • Quantum-based security.

Submission Instructions

Submitted papers must contain at most 6 pages (US letter, 9pt font size, double-column format, following the ACM master article template), including all figures, tables, and references. All submissions must be written in English and should contain the authors' names, affiliations, and contact information. The submission website is available at https://uswc2022.hotcrp.com/

Accepted papers will be published in ACM as part of the EWSN 2022 proceedings. Authors of accepted papers are expected to present their work in a plenary session as part of the main workshop program.

Important Dates

07 Jun
2022
Paper Submission
15 Jul
2022
Notification of acceptance
08 Aug
2022
Camera ready
03 Oct
2022
Workshop Day