Network security and privacy

Similar documents
Pre-Course Meeting Proseminar Network Hacking & Defense

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Seminar Optimizing data management on new hardware (OpDaMNeHa)

Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain

Web Engineering. VSR://EDU/Seminar. Prof. Dr.-Ing. Martin Gaedke Sebastian Heil, M. Sc. VSR.Informatik.TU-Chemnitz.de

XRM2018 Paper Preparation and Submission Guide

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

Solution Manual William Stallings Network Security

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

PRACTICE EXERCISES. Student Success SCRATCH

ITSE 1294 Special Topics in CS: Information Technology in Health Care (2:1-2)

Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus

Securing BGP Networks using Consistent Check Algorithm

ECET 590 Special Problems in Electrical & Computer Engineering Technology (SmartGrid Technology)

2. Course prerequisites, corequisites, and where the course fits in the program of study

PDA Trainer Certification Process V 1.0

Author Submission Guidelines

PowerPoint Basics. Getting Started

Cryptanalysis of a Markov Chain Based User Authentication Scheme

42 Computing in Science & Engineering 43 Concurrency, IEEE 44 Consumer Electronics Magazine, IEEE 45 Consumer Electronics, IEEE Transactions on 46

ECE 4450:427/527 - Computer Networks

International Journal of Advance Engineering and Research Development

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

Web Design: Business Site Project

Pseudonym Based Security Architecture for Wireless Mesh Network

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

BS375 AUDITING. This sample unit outline is provided by CHC for prospective and current students to assist with unit selection.

Seminar Recent Trends in Database Research

STUDY GUIDE: MASTER S DEGREE IN ECONOMIC POLICY

Introduction to PowerPoint 2013

Tree Structure and Algorithms for Physical Design

Education. Professional Experience. Awards and Honors

A Secure Routing Protocol for Wireless Adhoc Network Creation

Written Communication

Certicate programs in English Language

Analysis and Implementation Wireless Sensor Network of Information Technology Systems

S. Indirakumari, A. Thilagavathy

The General Analysis of Proactive Protocols DSDV, FSR and WRP

University of Bonn. Faculty of Agriculture ARTS. Agricultural Sciences and Resource Management in the Tropics and Subtropics.

HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING

CONCORDIA UNIVERSITY DEPARTMENT OF CHEMISTRY AND BIOCHEMISTRY CHEM 293 SPECTROSCOPY AND STRUCTURE OF ORGANIC COMPOUNDS. SYLLABUS Winter 2018

IP MULTIMEDIA SUBSYSTEM (IMS) SECURITY MODEL

Welcome to Part 5 of the slide show.

Australian Standard. Records Management. Part 1: General AS ISO ISO

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS

International Journal of Advance Engineering and Research Development

How To Write Maintainable Engineering Specifications. Forrest Warthman

This course contains the subject matter to prepare candidates for the ivanti Certified Service Desk 2017 Administrator exam.

CLICK (Complete Learning In Computer Knowledge)

PhD Candidacy Exam Overview

A S ISO Records Management Part 1: General

Netiquette: Composing

Challenges in Mobile Ad Hoc Network

Clone Detection for Efficient System in Wireless Sensor Network Using Ad Hoc on Demand Distance Vector (AODVC)

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

Adobe Connect Webinar Software Host

The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs

Business Computer Applications (BCIS 1305) Online. Credit: 3 semester credit hours (3 hours lecture)

Information and documentation Records management. Part 1: Concepts and principles AS ISO :2017 ISO :2016

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues

What are the elements of website design?

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

FORMAT & TYPING GUIDE

Writing Reports with Report Designer and SSRS 2014 Level 1

Web WRITING

ITSM Training for Field Service

The PCC CIS etutorial to PowerPoint

IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014

Writing for the Web. Nonprofit 911 Teleconference June 16, 209. Farra Trompeter Dan Gunderman

Using PowerPoint - 1

Radnor Middle School Course Syllabus. Fill in course name: Technology Education Computers Put in course number (4 digits):

CUE-10: Moderation Page 1. Comparative Usability Evaluation 10. Moderation. Observing usability test moderators

A Hierarchical Document Clustering Approach with Frequent Itemsets

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

A Review Paper on Voice over Internet Protocol (VoIP)

Ken Agress, Senior Consultant PlanNet Consulting, LLC.

Hello, welcome to this brief tutorial on accessing and playing Adobe Presenter video files.

Creating Great Visual Aids


Cryptanalysis on Two Certificateless Signature Schemes

Scalable overlay Networks

A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Metal Recovery from Low Grade Ores and Wastes Plus

INF 315E Introduction to Databases School of Information Fall 2015

epath - Participant s User Guide

Microsoft PowerPoint level 1 course content (1-day)

B.A. in Information Systems

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

PowerPoint TM Tutorial

A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks

ADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB

Visual Identity Standards

Chapter 22: Communication Process Study Guide Matching

Institute of Economic Sciences, Belgrade, Serbia Manual

PowerPoint 2016 Basics for Mac

Application Manual for International Baccalaureate Applications

Transcription:

Winter semester 2011/2012 Seminar on Network security and privacy (selected topics) Prof. Dr. Dieter Hogrefe Youssef Shehadeh Maimun Rizal 27.10.2011 1

Course Overview Prerequisites (Recommended): Mobile communication I Mobile communication II Implements Module: M.inf.122 - Seminar Telematik I M.Inf. 222 - Seminar Telematik II 3.06 - Advanced Topics in Computer Networking I (ITIS) Language English 2

Course Objectives Primary objectives: Learn some fundamentals of security and privacy issues in computer and wireless networks. Form the state of art on a certain topic. Provide a paper form report and a professional presentation for a chosen topic. Secondary objectives: Learn how to search for papers: IEEExplore, ACM, Citeseerx, whitepapers. Experience in preparing professional reports and presentations. 3

Hints on Reading papers PAPER Start QUICK SCAN Title, Abstract, Subtitles, Figures, Conclusion, READING Is the paper interesting? No Yes Thorough Reading Read carefully paper, discuss, analyze results. Summarize paper contributions, possible enhancements? End 4

Report Requirements: In form of IEEE conference template paper [two columns, 5-8 pages]: http://www.ieee.org/conferences_events/conferences/publi shing/templates.html Organization: Abstract, Introduction (Related work) Main part of your topic (model, discussion, analysis, simulations, results...) Conclusion PDF + Editable(Latex, word...) format 5

Hints on Writing Scientific Papers Abstract: not more than 100-150 words. Brief Introduction*: Introduce problem (why important, motivate) (Related work). Outline your contribution. Outline paper structure.(this paper is organized as follows...) Body*: Problem, system model/architecture, basics... Discussion, anaylsis. Evaluation, results. Summary and conclusions. Bibliography. *These points might vary with the subject topic. *Source:http://www.cs.columbia.edu/~hgs/etc/writing-style.html 6

Hints on Writing Scientific Papers Paragraphs should have a logical narrow flow. Avoid very long sentences. Clarify notations at first use. Write for the reader, not yourself. Not only show figures! Comment, Analyze and Abstract! Avoid spelling mistakes!!! Review several times! 7

Presentation High-quality presentation Well-structured, correct spelling, professional layout. Duration of each presentation ~30 minutes + ~10 minutes discussion. Slides presentation (e.g. Pdf, ppt, ) Compliance with set deadlines. 8

Hints for the Presentation Rule of thumb: A slide containing a normal content takes about 1-2 minutes for 30 minutes approximately 20-26 slides. Basic guide Welcome your audience. Try to speak without notes, do not read out loud everything from the slides word-by-word. Adjust your presentation speed so that the audience can follow. How to give a good research talk guide: http://research.microsoft.com/enus/um/people/simonpj/papers/giving-a-talk/giving-a-talk.htm 9

Selected Topics 1. Wireless Fingerprinting: identifying devices through physical layer characteristics 2. DOS Attacks against IEEE 802.11 3. Privacy Preservation in WSNs 4. Protecting Privacy in Participatory Sensing Systems 5. Security and Privacy in Vehicular Communication Systems 6. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications 7. Border Gateway Protocol (BGP) Security 8. Voice over IP Security 9. Man-in-the-Middle Attacks on VoIP 10. Authentication in Voice over Internet Protocol (VoIP) 10

References L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee, ''Identifying unique devices through wireless fingerprinting,'' In Proc. of WiSec, March/April 2008. L. Wang, B. Srinivasan and N. Bhattacharjee, ''Security Analysis and Improvements on WLANs,'' JOURNAL OF NETWORKS, VOL. 6, NO. 3, MARCH 2011 N. Li, N. Zhang, S. Das, and B. Thuraisingham, ''Privacy preservation in wireless sensor networks: A state-of-the-art survey,'' Journal on Ad Hoc Networks 7 (2009) 1501 1514 K. Huang, S. Kanhere, and W. Hu, ''Preserving privacy in participatory sensing systems,'' Journal on Computer communications 33 (2010), pp. 1266-1280 P. Papadimitratos, et al., ''Secure Vehicular Communication Systems: Design and Architecture,'' IEEE Communications Magazine, November 2008, pp.100-109 M. Al Ameen, J. Liu, and K. Kwak, ''Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications,'' Journal of Medical Systems, 1 9. DOI 10.1007/s10916-010-9449-4 K. Butler, T. Farley, P. Mcdaniel, and J. Rexford, ''A Survey of BGP Security Issues and Solutions,'' IEEE/ACM Trans. Netw., vol. 98, no. 1, pp. 100 122, Jan. 2010. A. Keromytis, ''A Comprehensive Survey of Voice over IP Security Research,'' IEEE Commun. Surveys Tutorials, vol. PP, no. 99, pp. 1 24, 2011. R. Zhang, X. Wang, R. Farley, X. Jiang,''On the Feasibility of Launching the Man-in-the-Middle Attacks on VoIP from remote Attackers'', ASLACCS09, March 10-12, 2009, Sydney, NSW, Australia. ACM 978-1-60558-394-5/09/03. F. Wang, Y. Zhang, ''A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography,'' Computer Communications, Volume 31, Issue 10, 25 June 2008, Pages 2142-2149, ISSN 0140-3664. 11

Course Plan 12

Grading points Report: 50% Presentation: 40% Active participation in seminar: 10%. Penalties may apply: Incompliance with set deadlines. Incomplete attendance of block seminar. 13

14