CSC 774 Advanced Network Security

Fall 2005

Presentations for the Advanced Topics

Grading policy for presentations

You can get most of the papers by following the links or searching in our library or citeseer.

You can choose any paper if it hasn't been assigned. Requests are accommodated in the order in which they are received. If you don't decide by October 21, the instructor will assign a paper to you.

Each of you will have about 20 minutes to present the paper, and 5 minutes for questions and answers. You can use your questions/answers time for presentation. However, if you don't leave enought time for questions and answers, you may lose points for that.

You need to send your presentation slides in ppt or pdf to the instructor by Friday in the week prior to your presentation. Late submission will result in penalty.

Topic Area
Date
Paper
Presenter
Broadcast Authentication
1
11/4/05
Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, and J.D. Tygar, "Distillation Codes and Applications to DoS Resistant Multicast Authentication", In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), February 2004.
Divya Gupta
2
 

11/4/05

Donggang Liu, Peng Ning, "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks," in Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 263-276, February 2003.
An Liu
3
11/9/05
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia, "Practical Broadcast Authentication in Sensor Networks," in Proceedings of The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), pages 118--129, July 2005.
Tong Zhou
Group Key Management
4
 
11/9/05
Chung Kei Wong, Mohamed Gouda, Simon S. Lam, "Secure group communications using key graphs," In Proceedings of SIGCOMM '98, Pages: 68 - 79.
Siddharth Bhai
5
11/11/05
Dalit Naor, Moni Naor, Jeff Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers", in Lecture Notes in Computer Science, volume 2139, pages 41--??, 2001.
Young June Pyun
6
11/11/05
G. Ateniese and M. Steiner and G. Tsudik, "Authenticated Group Key Agreement and Friends," in Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 17 -- 26, 1998.
Young Hee Park
7
11/14/05
Donggang Liu, Peng Ning, Kun Sun, "Efficient Self-Healing Group Key Distribution with Revocation Capability," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 231--240, Washington D.C., October, 2003.
Haihui Huang
MANET Security
 
8
11/14/05
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," In Proceedings of the INFOCOM 2003.
Jinsuk Jun
9
 
11/16/05
Lingxuan Hu and David Evans, "Using Directional Antennas to Prevent Wormhole Attacks," In Proceedings of NDSS '04.
Juan Du
10
 
11/16/05
Yih-Chun Hu, Adrian Perrig, David Johnson, "Efficient Security Mechanisms for Routing Protocols," In Proceedings of NDSS 2003.
Yuzheng Zhou
Security in Wireless Sensor Networks
11
11/18/05
Donggang Liu, Peng Ning, Wenliang Du, "Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks," in Proceedings of the The 25th International Conference on Distributed Computing Systems (ICDCS '05), pages 609--619, June 2005.
Akshay Lal
12
11/18/05
Bryan Parno, Adrian Perrig, Vilgil Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," in Proceedings of 2005 IEEE Symposium on Security and Privacy, May 2005.
Amit Singh
13
 
11/21/05
Haowen Chan, Mark Luk, Adrian Perrig, "Using Clustering Information for Sensor Network Localization," in Proceedings of IEEE Conference on Distributed Computing in Sensor Systems (DCOSS 2005).
Duifa Long
14
11/21/05
P. Kamat, Y. Zhang, W. Trappe, C. Ozturk, "Enhancing Source-Location Privacy in Sensor Network Routing," IEEE ICDCS 2005.
Brian Rogers
15
11/28/05
S. Ganeriwal, S. Capkun, S. Han, M. Srivastava,
"Secure Time Synchronization Service for Sensor Networks," In Proceedings of the Wireless Security Workshop (WiSe) 2005.
Kaiqi Xiong
16
11/28/05
W. Zhang, H. Song, S. Zhu, and G. Cao. "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," in Proceedings of ACM MOBIHOC'05, May 2005.
Jennifer Frankie