170 likes | 183 Views
This course explores the principles of computer network security and privacy, with a focus on wireless networks. Topics include Bluetooth, WiFi, Vehicular Networks, Sensor Networks, and RFID. Students will participate in presentations, paper summaries, a research project, and class discussions.
E N D
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008
Course Goal: • Understand the basic principles of computer network security and privacy • Wireless network basic • Security • Privacy • Read and discuss interesting recent work in several areas of wireless network security and privacy • Get involved in wireless network security and privacy research by doing a project • Understand how research is done • How to determine what is important • What are the trend CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Administrative • Course website: • http://www.cse.sc.edu/~wyxu/2008-csce790/csce790.htm • Announcements • Lecture Notes • Links to required/recommended readings • How to reach me: • Course meeting time: Time: TTH 3:30PM - 4:45PM • Email: wyxu@engr.sc.edu • Office Hours: TTH 5:00am-6:00pm or by appointment • Office: SWGN 3A54 • Recommended reference book: • “Cryptography and Network Security” by William Stallings CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Pre-requisites • CSCE 416 Computer Networks • Strong motivation CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Tentative topics • Wireless networks: • Bluetooth • WiFi/802.11 • Vehicular Networks • Sensor Network • RFID (Radio-Frequency Identification) • Topics : • Secure localization; • RFID privacy • Spoofing attacks • Jamming attacks • Location privacy in sensor network • Wormhole attacks CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Structure • Will run somewhat like a seminar • Course based on presentation and discussion of papers • Background reading from online material • I will give the first two lectures: one on network basics and one on security basics • Students are responsible for all of the presentations • I may give short discussions on appropriate background for some topics before the presentations • Auditors are expected to read papers and participate • One papers per lecture + discussion of progress CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Requirements • Presentations and research project • Expect about 1 (perhaps 2, depending on enrollment) • Participate in 1 project ( group project) • Read and summarize papers before classes • Summaries will be electronically submitted via dropbox • Write 1 position paper • You will “grade” each other’s position paper • Participation during classes • At the end of the semester, you must document 3 times that a comment or question from you led to a significant discussion during class CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Grading • 20% presentations • 10% paper summaries • 40% project • 10% position paper • 20% class discussions and participation CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Presentations • Make sure to prepare your presentation well! • Time: 50 minutes • Send me your slides before/after class • Getting slides from authors or other sources is NOT allowed • Grading will be based on how well you (a) organize and deliver your presentation, (b) cover the critical points of the paper, and (c) answer questions • Please, do not make us wait. Set yourself up before the beginning of class • The presenter has to come to my office hour at least 48 hours before your presentation! • Choose which papers you would like to present and send me email • FCFS CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Key points of presentation • Be very clear about how much time you have • Be very clear about your key message • Most good speakers average two minutes per slide (not counting title and outline slides. • Each theme should be the subject of a small number of slides • Each slide should have clear heading. • Make appropriate use of pictures • Each slide should normally contain around 25-35 words CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
A Generic Talk Outline • Title/author/affiliation (1 slide) • Forecast (1 slide) (optional)Give gist of problem attacked and insight found (What is the one idea you want people to leave with? This is the "abstract" of an oral presentation.) • Outline (1 slide)Give talk structure. (Audiences like predictability.) • Background • Motivation and Problem Statement (2-3 slides)(Why should anyone care? Most researchers overestimate how much the audience knows about the problem they are attacking.) • Related Work (2-3 slides)Important in the class presentation • Methods (3-6 slide) http://pages.cs.wisc.edu/~markhill/conference-talk.html#outline CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
A Generic Talk Outline • Results (3-6 slides) • Present key results and key insights. • Do not superficially cover all results; cover key result well. • Do not just present numbers; interpret them to give insights. • Summary (1 slide) • Future Work (1-2 slides) • Give problems this research opens up. • Put down your own opinion. • Backup Slides (0-3 slides)Optionally have a few slides ready (not counted in your talk total) to answer expected questions. (Likely question areas: ideas glossed over, shortcomings of methods or results, and future work.) http://pages.cs.wisc.edu/~markhill/conference-talk.html#outline CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Summaries • Summaries should describe the key ideas and results • Should also point out good and bad aspects of each paper • Suggestion(s) for future work are highly encouraged • Must not be regurgitation of parts of the paper; use your own words CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Project • Participation in projects • Form a team: 3-5 people • Implement the project described in a paper, and validate whether your experiment results are consistent with the one presented in the paper. • Find a problem in a survey paper. Come up with your own solution and validate it. • Combine the course project with your own research project. • The project that you chose has to be approved by me. • It has to be wireless security privacy related. CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Position paper (3 pages) • Goal: • Presents an arguable opinion about an issue • Convince the audience that your opinion is valid and worth listening to • How: • choose a topic, developing your argument • address all sides of the issue • take one side of the argument • support your argument with evidence • address the counterclaims to show that you are well informed about both sides. CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Email Policies • Make sure you put your course (CSCE790) in the subject of the message. • Remember that it is not my emergency if you need help at the last minute. I may check my messages in time to help you make a deadline, but this may not necessarily be the case. • Ask specific question instead of general question. • Bad example: “What course project I should work on?” • In general, I will answer quick questions sooner than one that will take a long time to answer • In general I will monitor and respond to emails during office hours, but in-person students will take precedence. CSCE790: Security and Privacy for Emerging Ubiquitous Communication system
Your Best Strategy • Come to every lecture • Read and summarize papers that will be presented • Participate in the discussion during class! • Do not wait till last minute to work on project • Enjoy the fun! CSCE790: Security and Privacy for Emerging Ubiquitous Communication system