1 / 17

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

This course explores the principles of computer network security and privacy, with a focus on wireless networks. Topics include Bluetooth, WiFi, Vehicular Networks, Sensor Networks, and RFID. Students will participate in presentations, paper summaries, a research project, and class discussions.

ivelisse
Download Presentation

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008

  2. Course Goal: • Understand the basic principles of computer network security and privacy • Wireless network basic • Security • Privacy • Read and discuss interesting recent work in several areas of wireless network security and privacy • Get involved in wireless network security and privacy research by doing a project •  Understand how research is done • How to determine what is important • What are the trend CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  3. Administrative • Course website: • http://www.cse.sc.edu/~wyxu/2008-csce790/csce790.htm • Announcements • Lecture Notes • Links to required/recommended readings • How to reach me: • Course meeting time: Time: TTH 3:30PM - 4:45PM • Email: wyxu@engr.sc.edu • Office Hours: TTH 5:00am-6:00pm or by appointment • Office: SWGN 3A54 • Recommended reference book: • “Cryptography and Network Security” by William Stallings CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  4. Pre-requisites • CSCE 416 Computer Networks • Strong motivation CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  5. Tentative topics • Wireless networks: • Bluetooth • WiFi/802.11 • Vehicular Networks • Sensor Network • RFID (Radio-Frequency Identification) • Topics : • Secure localization; • RFID privacy • Spoofing attacks • Jamming attacks • Location privacy in sensor network • Wormhole attacks CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  6. Structure • Will run somewhat like a seminar • Course based on presentation and discussion of papers • Background reading from online material • I will give the first two lectures: one on network basics and one on security basics • Students are responsible for all of the presentations • I may give short discussions on appropriate background for some topics before the presentations • Auditors are expected to read papers and participate • One papers per lecture + discussion of progress CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  7. Requirements • Presentations and research project • Expect about 1 (perhaps 2, depending on enrollment) • Participate in 1 project ( group project) • Read and summarize papers before classes • Summaries will be electronically submitted via dropbox • Write 1 position paper • You will “grade” each other’s position paper • Participation during classes • At the end of the semester, you must document 3 times that a comment or question from you led to a significant discussion during class CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  8. Grading • 20% presentations • 10% paper summaries • 40% project • 10% position paper • 20% class discussions and participation CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  9. Presentations • Make sure to prepare your presentation well! • Time: 50 minutes • Send me your slides before/after class • Getting slides from authors or other sources is NOT allowed • Grading will be based on how well you (a) organize and deliver your presentation, (b) cover the critical points of the paper, and (c) answer questions • Please, do not make us wait. Set yourself up before the beginning of class • The presenter has to come to my office hour at least 48 hours before your presentation! • Choose which papers you would like to present and send me email • FCFS CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  10. Key points of presentation • Be very clear about how much time you have • Be very clear about your key message • Most good speakers average two minutes per slide (not counting title and outline slides. • Each theme should be the subject of a small number of slides • Each slide should have clear heading. • Make appropriate use of pictures • Each slide should normally contain around 25-35 words CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  11. A Generic Talk Outline • Title/author/affiliation (1 slide) • Forecast (1 slide) (optional)Give gist of problem attacked and insight found (What is the one idea you want people to leave with? This is the "abstract" of an oral presentation.) • Outline (1 slide)Give talk structure. (Audiences like predictability.) • Background • Motivation and Problem Statement (2-3 slides)(Why should anyone care? Most researchers overestimate how much the audience knows about the problem they are attacking.) • Related Work (2-3 slides)Important in the class presentation • Methods (3-6 slide) http://pages.cs.wisc.edu/~markhill/conference-talk.html#outline CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  12. A Generic Talk Outline • Results (3-6 slides) • Present key results and key insights. • Do not superficially cover all results; cover key result well. • Do not just present numbers; interpret them to give insights. • Summary (1 slide) • Future Work (1-2 slides) • Give problems this research opens up. • Put down your own opinion. • Backup Slides (0-3 slides)Optionally have a few slides ready (not counted in your talk total) to answer expected questions. (Likely question areas: ideas glossed over, shortcomings of methods or results, and future work.) http://pages.cs.wisc.edu/~markhill/conference-talk.html#outline CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  13. Summaries • Summaries should describe the key ideas and results • Should also point out good and bad aspects of each paper • Suggestion(s) for future work are highly encouraged • Must not be regurgitation of parts of the paper; use your own words CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  14. Project • Participation in projects • Form a team: 3-5 people • Implement the project described in a paper, and validate whether your experiment results are consistent with the one presented in the paper. • Find a problem in a survey paper. Come up with your own solution and validate it. • Combine the course project with your own research project. • The project that you chose has to be approved by me. • It has to be wireless security privacy related. CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  15. Position paper (3 pages) • Goal: • Presents an arguable opinion about an issue • Convince the audience that your opinion is valid and worth listening to • How: • choose a topic, developing your argument • address all sides of the issue • take one side of the argument • support your argument with evidence • address the counterclaims to show that you are well informed about both sides. CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  16. Email Policies • Make sure you put your course (CSCE790)  in the subject of the message. • Remember that it is not my emergency if you need help at the last minute. I may check my messages in time to help you make a deadline, but this may not necessarily be the case. • Ask specific question instead of general question. • Bad example: “What course project I should work on?” • In general, I will answer quick questions sooner than one that will take a long time to answer • In general I will monitor and respond to emails during office hours, but in-person students will take precedence. CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

  17. Your Best Strategy • Come to every lecture • Read and summarize papers that will be presented • Participate in the discussion during class! • Do not wait till last minute to work on project • Enjoy the fun! CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

More Related