Download CSCE 515: Computer Network Programming

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
CSCE790: Security and
Privacy for Emerging
Ubiquitous Communication
system
Wenyuan Xu
Department of Computer Science and Engineering
University of South Carolina
2008
Course Goal:

Understand the basic principles of computer network security and
privacy



Wireless network basic
Security
Privacy

Read and discuss interesting recent work in several areas of
wireless network security and privacy

Get involved in wireless network security and privacy research by
doing a project

Understand how research is done


2008
How to determine what is important
What are the trend
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Administrative

Course website:

http://www.cse.sc.edu/~wyxu/2008-csce790/csce790.htm




How to reach me:





Course meeting time: Time: TTH 3:30PM - 4:45PM
Email: [email protected]
Office Hours: TTH 5:00am-6:00pm or by appointment
Office: SWGN 3A54
Recommended reference book:

2008
Announcements
Lecture Notes
Links to required/recommended readings
“Cryptography and Network Security” by William Stallings
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Pre-requisites

CSCE 416 Computer Networks

Strong motivation
2008
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Tentative topics

Wireless networks:






Topics :






2008
Bluetooth
WiFi/802.11
Vehicular Networks
Sensor Network
RFID (Radio-Frequency Identification)
Secure localization;
RFID privacy
Spoofing attacks
Jamming attacks
Location privacy in sensor network
Wormhole attacks
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Structure

Will run somewhat like a seminar
 Course
based on presentation and discussion of
papers

Background reading from online material
I
will give the first two lectures: one on network basics
and one on security basics
 Students are responsible for all of the presentations

I may give short discussions on appropriate background for
some topics before the presentations
 Auditors

2008
are expected to read papers and participate
One papers per lecture + discussion of progress
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Requirements

Presentations and research project



Read and summarize papers before classes


You will “grade” each other’s position paper
Participation during classes

2008
Summaries will be electronically submitted via dropbox
Write 1 position paper


Expect about 1 (perhaps 2, depending on enrollment)
Participate in 1 project ( group project)
At the end of the semester, you must document 3 times that a
comment or question from you led to a significant discussion
during class
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Grading

20% presentations

10% paper summaries

40% project

10% position paper

20% class discussions and participation
2008
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Presentations

Make sure to prepare your presentation well!

Time: 50 minutes

Send me your slides before/after class
 Getting slides from authors or other sources is NOT allowed
 Grading will be based on how well you (a) organize and deliver
your presentation, (b) cover the critical points of the paper, and (c)
answer questions
 Please, do not make us wait. Set yourself up before the beginning
of class

The presenter has to come to my office hour at least 48 hours
before your presentation!

Choose which papers you would like to present and send me
email

2008
FCFS
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Key points of presentation







2008
Be very clear about how much time you have
Be very clear about your key message
Most good speakers average two minutes
per slide (not counting title and outline
slides.
Each theme should be the subject of a small
number of slides
Each slide should have clear heading.
Make appropriate use of pictures
Each slide should normally contain around
25-35 words
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
A Generic Talk Outline

Title/author/affiliation (1 slide)

Forecast (1 slide) (optional)
Give gist of problem attacked and insight found (What is the one idea you
want people to leave with? This is the "abstract" of an oral presentation.)

Outline (1 slide)
Give talk structure. (Audiences like predictability.)

Background

Motivation and Problem Statement (2-3 slides)
(Why should anyone care? Most researchers overestimate how much the
audience knows about the problem they are attacking.)

Related Work (2-3 slides)
Important in the class presentation

Methods (3-6 slide)
http://pages.cs.wisc.edu/~markhill/conference-talk.html#outline
2008
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
A Generic Talk Outline

Results (3-6 slides)

Present key results and key insights.


Do not superficially cover all results; cover key result well.
Do not just present numbers; interpret them to give insights.

Summary (1 slide)

Future Work (1-2 slides)



Give problems this research opens up.
Put down your own opinion.
Backup Slides (0-3 slides)
Optionally have a few slides ready (not counted in your talk total) to
answer expected questions. (Likely question areas: ideas glossed
over, shortcomings of methods or results, and future work.)
http://pages.cs.wisc.edu/~markhill/conference-talk.html#outline
2008
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Summaries

Summaries should describe the key ideas
and results
 Should
also point out good and bad aspects
of each paper
 Suggestion(s) for future work are highly
encouraged
 Must not be regurgitation of parts of the
paper; use your own words
2008
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Project

Participation in projects

Form a team: 3-5 people

Implement the project described in a paper, and validate whether
your experiment results are consistent with the one presented in
the paper.

Find a problem in a survey paper. Come up with your own
solution and validate it.

Combine the course project with your own research project.


The project that you chose has to be approved by me.

2008
It has to be wireless security privacy related.
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Position paper (3 pages)

Goal:
 Presents
an arguable opinion about an issue
 Convince the audience that your opinion is valid and
worth listening to

How:
 choose
a topic, developing your argument
 address all sides of the issue
 take one side of the argument
 support your argument with evidence
 address the counterclaims to show that you are well
informed about both sides.
2008
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Email Policies

Make sure you put your course (CSCE790) in the subject of the
message.

Remember that it is not my emergency if you need help at the
last minute. I may check my messages in time to help you make a
deadline, but this may not necessarily be the case.

Ask specific question instead of general question.



2008
Bad example: “What course project I should work on?”
In general, I will answer quick questions sooner than one that will take a
long time to answer
In general I will monitor and respond to emails during office
hours, but in-person students will take precedence.
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system
Your Best Strategy

Come to every lecture

Read and summarize papers that will be
presented

Participate in the discussion during class!

Do not wait till last minute to work on project

Enjoy the fun!
2008
CSCE790: Security and Privacy for Emerging
Ubiquitous Communication system