CSC 774 Advanced Network Security

Fall 2005

(This page will be changed frequently. Check before class.)

Papers advanced topics; paper selection is done on a first come first serve basis. Grading form for inclass presentation can be found here. Your selection is due by 10/21/05.

Guideline for preparing for mid-term exam #2.

Sample mid-term exams: Exam 1; Exam 2. (Note that some questions in these exams are not in the scope of CSC 774 this semester.)

Schedule of Classes

Instructor:

Dr. Peng Ning

Office 250 Venture III, Centennial Campus

Office hours:

Mondays 2:30pm - 3:30pm; Wednesdays 3:00pm - 4:00pm

Office phone:

(919) 513-4457

Fax:

(919)513-7447

Email address:

pning(at)ncsu.edu.

Homepage:

http://www.csc.ncsu.edu/faculty/ning

Teaching assistant:

Mr. Mithun Acharya

Office hours:

Tuesdays 9:30 am - 11:30 am; Ventures I, Suite 110, Room 102 (please ring the bell)

Email address:

mpachary(at)ncsu.edu

Class location:

EB II Room 1226

Day and time:

Mondays, Wednesdays, and Fridays, 10:40am -- 11:30am

Mailing list:

csc774-001@wolfware.ncsu.edu

Web page:

http://courses.ncsu.edu/csc774/lec/001/

Message Board:

http://courses.ncsu.edu/csc774/
Course Syllabus: http://courses.ncsu.edu/csc774/lec/001/syllabus.pdf

Note on assignments:

You must use text editor (e.g. MS Word) to complete your homework. Handwritten submissions are not accepted. You should submit hard copies unless otherwise specified.

All work is to be performed individually unless otherwise specified. For the collaborative problems, you are encouraged to form teams of 1-3 members (of students in this class) to cooperate only on those problems. After discussing the problems, please write up your answers individually. Indicate the names of the other members in your team, if any.

You get no extra credit for working alone where collaboration is permitted.

In-Class Presentation:

Each student is required to give a presentation on a research paper assigned by the instructor. The list of papers will be put here.

Here is the grading form for the in-class presentation.

Term Paper :

Each student is required to complete a survey paper or a research paper. Each student needs to submit a proposal in the middle of the semester and the final version by the end of the semester. Both will be graded. Students can form teams, each with up to three members.

You are encouraged to write research papers. There will be bonus points depending on the quality of the proposal or the paper. However, you are advised that it is in general more difficult to write an original research paper than a survey paper. You are encouraged to combine this effort with their current research. You are also encouraged to discuss your work with the instructor during his office hours or by appointment.

Requirements for research/survey paper proposal 

Requirements for final research/survey paper

  • Research Paper
    • You can work on original research problems. The outcome should be a paper with original technical contribution. Your grade on this will be judged on originality, soundness of the approach, and quality of presentation. 
    • You are encouraged to choose this if you are a PhD student or a master student that has to complete a thesis.
  • Survey Paper
    • You can write a paper that surveys a particular field on information security. The outcome should be a paper that summarizes the trend in the field you have chosen. Your grade will be judged on the completeness of the survey, the quality of the trend analysis, and the quality of presentation.
  • Example Topic Areas (More will be posted):
    • Topics related to wireless sensor networks
      • Key management
      • Secure data collection
      • Intrusion detection
      • Secure location discovery
      • Secure time synchronization
      • Efficient implementation
    • Vulnerability Analysis
    • Wireless Security
    • Intrusion Detection
    • Authentication
    • DNS Security
    • Digital Watermarking
    • New Attacks

Schedule of classes

Date

Topics

Reading Assignment
(Complete before class.)

Homework Assignment

Handouts

08/17/05 Topic 1. Course Introduction     pdf, pps
08/19/05 Topic 2. Review of Cryptography Techniques     pdf, pps

08/22/05

Topic 2. (Cont'd)

Topic 3. Electronic Payment Systems

Topic 3.1 NetBill

Benjamin Cox, J.D. Tygar, and Marvin Sirbu. "Netbill Security and Transaction Protocol," In The First USENIX Workshop on Electronic Commerce, pages 77--88, July 1995.
See also the NetBill Project Website.
Questions for reading assignment pdf, pps
08/24/05

Topic 3.1 (Cont'd)

 

   
08/26/05 Class cancelled      
08/29/05

Topic 3.1 (Cont'd)

Topic 3.2 Micropayment

R.L. Rivest, A. Shamir, "PayWord and MicroMint: Two simple micropayment schemes," In Proceedings of Security Protocols Workshop, pages 69 - 87, 1996.

(optional) Silvio Micali and Ronald Rivest. Micropayments revisited. In Bart Preneel, editor, Progress in Cryptology --- CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science. Springer-Verlag, February 18-22 2002.

 

Questions for reading assignment pdf, pps
08/31/05

Topic 3.2 (Cont'd)

Topic 3.3 Fair Exchange

N. Asokan, M. Schunter, and M. Waidner."Optimistic Protocols for Fair Exchange," In Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, April 1997. Questions for reading assignment pdf, pps
09/02/05

Topic 3.3 (Cont'd)

     
09/05/05 No class
(Labor Day)
     
09/07/05

Topic 3.3 (Cont'd)

     
09/09/05

Topic 4. Broadcast Authentication

Topic 4.1 TESLA and EMSS

A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” in Proc. of IEEE Security and Privacy Symposium, May 2000.
(Optional) A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient and Secure Source Authentication for Multicast,” in Proceedings of Network and Distributed System Security Symposium, February 2001.

Questions for reading assignment

HW1(doc)

TA's reference solution

(Due by 9/23/05)

pdf, pps
09/12/05

Topic 4.1 (Cont'd)

 

   
09/14/05 Topic 4.2 BiBa

Adrian Perrig, "The BiBa One-Time Signature and Broadcast Authentication Protocol," in Proceedings of the ACM Conference on Computer and Communications Security, November, 2001.

Questions for reading assignment pdf, pps
09/16/05

Topic 4.2 (Cont'd)

 

   
09/19/05 Mid-term exam #1 Scope: Topics covered on or before 09/14/05 Grade Distribution  
09/21/05

Topic 5. Group Key Management

Topic 5.1 Group Key Agreement

M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman Key Distribution Extended to Group Communication,” in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pages 31--37, 1996.

Questions for reading assignment pdf, pps
09/23/05 Review of mid-term exam #1      
09/26/05 Guest lecture:
Pan Wang
Network Access Control for MANETs   ppt
09/28/05 Guest lecture:
Pan Wang
Anomymous Communication   ppt
09/30/05 Topic 5.1 (Cont'd)

 

   
10/03/05

Topic 5.2 Tree-Based Group DH

 

Y. Kim. A. Perrig and G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups." In Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM Press, Nov. 2000.

Questions for reading assignment

HW2 (pdf)

TA's reference solution

(Due by 10/19/05)

pdf (with animation, without animation), pps
10/05/05

Topic 5.2 (Cont'd)

Topic 5.3 Group Key Distribution

Suvo Mittra, "Iolus: a framework for scalable secure multicasting," In Proceedings of the ACM SIGCOMM '97, pages 277 - 288, 1997.

Questions for reading assignment

Proposal for research paper due

pdf, pps
10/07/05

No class
(Fall Break)

 

 

   
10/10/05

Topic 5.3 (Cont'd)

 

D. Wallner, E. Harder, R. Agee, "Key Management for Multicast: Issues and Architectures," IETF RFC 2627, June 1999.

(Optional) Chung Kei Wong, Mohamed Gouda, Simon S. Lam, "Secure group communications using key graphs," In Proceedings of SIGCOMM '98, Pages: 68 - 79.

   
10/12/05

Topic 6. MANET Security

Topic 6.1 Secure Ad-Hoc Routing Protocols

Y. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad-Hoc Networks,” in Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), September, 2002. Questions for reading assignment pdf, pps
10/14/05

Topic 6.1 (Cont'd)

 

   
10/17/05

Guest Lecture:
Kun Sun

Peng Ning, Kun Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols," in Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003.   pdf
10/19/05

Topic 7. Wireless Sensor Network Security

Topic 7.1 Key Pre-Distribution for Wireless Sensor Networks

L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41--47, November, 2002.

(Optional) H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," in Proceedings of 2003 IEEE Symposium on Security and Privacy, May 2003.

Questions for reading assignment pdf, pps
10/21/05

Topic 7.1 (Cont'd)

D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 52--61, Washington D.C., October, 2003.

   
10/24/05 Topic 7.1 (Cont'd)      
10/26/05

Introduction to Advanced Topics

Topic 7.1 (Cont'd)

Topic 7.2 Secure Aggregation (Optional)

Bartosz Przydatek, Dawn Song, Adrian Perrig, "SIA: Secure Information Aggregation in Sensor Networks", In Proceedings of ACM SenSys 2003.

  pdf, pps
10/28/05

Topic 7.3 Secure and Resilient Location Discovery

Donggang Liu, Peng Ning, Wenliang Du, "Attack-Resistant Location Estimation in Sensor Networks," in Proceedings of The Fourth International Symposium on Information Processing in Sensor Networks (IPSN '05), pages 99 -- 106, April 2005.

  pdf, pps
10/31/05

Mid-Term Review

Topic 8. Misc (Optional)

Topic 8.1 Client Puzzles

A. Juels and J. Brainard, "Client puzzels: A cryptographic countermeasure against connection depletion
attacks
," In Proceedings of the 6th Network and Distributed Systems Security Symposium (NDSS ’99),
February 1999.
   
11/02/05 Mid-Term Exam #2 Scope: Topics covered from 09/16/05 to 10/28/05 Grade Distribution  
11/04/05 Advanced Topics

1. Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, and J.D. Tygar, "Distillation Codes and Applications to DoS Resistant Multicast Authentication", In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), February 2004.

2. Donggang Liu, Peng Ning, "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks," in Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 263-276, February 2003.

 

Divya Gupta

An Liu

11/07/05 Review of Mid-term exam #2 (TA)      
11/09/05 Advanced Topics (Supervised by TA)

3. Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia, "Practical Broadcast Authentication in Sensor Networks," in Proceedings of The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), pages 118--129, July 2005.

4. Chung Kei Wong, Mohamed Gouda, Simon S. Lam, "Secure group communications using key graphs," In Proceedings of SIGCOMM '98, Pages: 68 - 79.

 

Tong

Siddharth

11/11/05 Advanced Topics (Supervised by TA)

5. Dalit Naor, Moni Naor, Jeff Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers", in Lecture Notes in Computer Science, volume 2139, pages 41--??, 2001.

6. G. Ateniese and M. Steiner and G. Tsudik, "Authenticated Group Key Agreement and Friends," in Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 17 -- 26, 1998.

 

Young June

Young Hee

11/14/05 Advanced Topics

7. Donggang Liu, Peng Ning, Kun Sun, "Efficient Self-Healing Group Key Distribution with Revocation Capability," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 231--240, Washington D.C., October, 2003.

8. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," In Proceedings of the INFOCOM 2003.

 

Haihui

Jinsuk

11/16/05 Advanced Topics

9. Lingxuan Hu and David Evans, "Using Directional Antennas to Prevent Wormhole Attacks," In Proceedings of NDSS '04.

10. Yih-Chun Hu, Adrian Perrig, David Johnson, "Efficient Security Mechanisms for Routing Protocols," In Proceedings of NDSS 2003.

 

Juan

Yuzheng

11/18/05 Advanced Topics

11. Donggang Liu, Peng Ning, Wenliang Du, "Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks," in Proceedings of the The 25th International Conference on Distributed Computing Systems (ICDCS '05), pages 609--619, June 2005.

12. Bryan Parno, Adrian Perrig, Vilgil Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," in Proceedings of 2005 IEEE Symposium on Security and Privacy, May 2005.

 

Akshay

Amit

11/21/05 Advanced Topics

13. Haowen Chan, Mark Luk, Adrian Perrig, "Using Clustering Information for Sensor Network Localization," in Proceedings of IEEE Conference on Distributed Computing in Sensor Systems (DCOSS 2005).

14. P. Kamat, Y. Zhang, W. Trappe, C. Ozturk, "Enhancing Source-Location Privacy in Sensor Network Routing," IEEE ICDCS 2005.

 

Duifa

Brian

11/23/05 No class
(Thanksgiving)
     
11/25/05 No class
(Thanksgiving)
     
11/28/05 Advanced Topics

15. S. Ganeriwal, S. Capkun, S. Han, M. Srivastava,
"Secure Time Synchronization Service for Sensor Networks," In Proceedings of the Wireless Security Workshop (WiSe) 2005.

Teaching Evaluation

 

Kaiqi

 

11/30/05 Five-minute report on research paper

16. W. Zhang, H. Song, S. Zhu, and G. Cao. "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," in Proceedings of ACM MOBIHOC'05, May 2005.

5-minute talks

1. Jennifer Frankie and Akshay Lal, eMR: A Secure Protocol for e-Medical Records

2. Brian Rogers, Data Protection and Key Management for Secure Distributed Shared Memory Systems

3. Sid Bhai, Divya Gupta, and Amit Singh, Combinatorial Design of Polynomial-Based Key
Predistribution for Wireless Sensor Networks

4. Tong Zhou, Authentication of Sensor Network Broadcast Based on Guard Nodes and
Shamir Secret Sharing

  Jennifer
12/02/05

Five-minute report on research paper

5. Kaiqi Xiong, Duifa Long, Secure Dynamic Localization in Wireless Sensor Networks

6. Young June Pyun, Young Hee Park, Timing-Based Active Correlation of Traffic Flows with Repacketization

7. Yuzheng Zhou, How to detect buffer overflow attack

8. Juan Du, Design incentives against rational attack in P2P Networks

9. An Liu, Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

10. Jinsuk Jun, Vulnerabilities of Wireless Networks

11. Haihui Huang, Wireless Security Survey

Research paper due  
         

©Copyright 2005, Peng Ning