CSC/ECE 774 Advanced Network Security

Class Schedule

Note: This is a tentative schedule, and will be updated. Please check frequently.

Acknowledgment:

Some of the slides were initially prepared by my (former) PhD students Dr. An Liu, Sangwon Hyun, and Emre (John) Sezer, as well as Tong Zhou from Duke University. Some others were provided by the authors of the corresponding papers.

Date Topics Reading Assignments
Handouts
08/18/10

Topic 1. Introduction

Topic 2. Network Security Primitives

Topic 2.1 Absolute Basics

 

Topic 1

Topic 2.1

08/23/10

No Class
(Instructor out of town)

Make-up lecture on 09/03/10.

 

08/25/10

Topic 2.1 (Cont'd)

Topic 2.2 Hash-Based Primitives

R. Merkle. "A certified digital signature." In Advances in Cryptology -CRYPTO '89, pages 218-239, 1990.

Bloom filter (Wikipedia)

A. Juels and J. Brainard, "Client puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks." in: Proceedings of NDSS '99, 1999, pp. 151--165.

Topic 2.2

08/30/10

Topic 2.2 (Cont'd)

T. Aura, P. Nikander, and J. Leiwo, "DoS-Resistant Authentication with Client Puzzles." In Proceedings of the 8th International Workshop on Security Protocols, LNCS 2133, 170-177.

Topic 2.2.x-ClientPuzzle (pps)

09/01/10

 

Topic 2.2 (Cont'd)

Topic 2.3 Secret Sharing

Topic 2.4 Rabin's Information Dispersal Algorithms

 

B. Waters, A. Juels, J. Halderman, and E. Felten, "New Client Puzzle Outsourcing Techniques for DoS Resistance." In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), 246-256.

A. Shamir, How to share a secret, Communications of the ACM, Vol. 22, No. 11, pages 612-613, 1970.

Secret Sharing on Wikipedia

Michael O. Rabin. "Efficient dispersal of information for security, load balancing, and fault tolerance." In Journal of the ACM, Vol. 36, No. 2, 1989.

Topic 2.3

Topic 2.4 (pps)

09/03/10

Make-up Lecture
(make up for 08/23/10)

10:30am -- 11:45am
Room 3211, EB II

Topic 2.5 Secret Handshake

 

D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, and H.C.Wong."Secret handshakes from pairing-based key agreements." In IEEE Symposium on Security and Privacy, 2003.

C. Castelluccia, S. Jarecki and G. Tsudik. "Secret Handshakes from CA-oblivious Encryption." IACR AsiaCrypt'04, December 2004.

Topic 2.5

09/06/10

No Class
(Labor Day)

 

 

09/08/10

Topic 2.5 (Cont'd)

Topic 2.6 ID-Based Cryptography

Adi Shamir. "Identity-Based Cryptosystems and Signature Schemes." Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, 7:47--53, 1984.

Dan Boneh, Matthew K. Franklin, "Identity-Based Encryption from the Weil Pairing." Advances in Cryptology - Proceedings of CRYPTO 2001 (2001).

Topic 2.6.1

Topic 2.6.2

09/10/10

Make-up Lecture
(make up for 11/08/10)

Topic 2.6 (Cont'd)

 

09/13/10

Topic 3. Electronic Payment Systems

Topic 3.1 NetBill

Benjamin Cox, J.D. Tygar, and Marvin Sirbu. "Netbill Security and Transaction Protocol," In The First USENIX Workshop on Electronic Commerce, pages 77--88, July 1995.

Topic 3.1

09/15/10

Topic 3.2 Micropayment

R.L. Rivest, A. Shamir, "PayWord and MicroMint: Two simple micropayment schemes," In Proceedings of Security Protocols Workshop, pages 69 - 87, 1996.

(optional) Silvio Micali and Ronald Rivest. Micropayments revisited. In Bart Preneel, editor, Progress in Cryptology --- CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science. Springer-Verlag, February 18-22 2002.

Topic 3.2
09/20/10

Topic 3.3 Fair Exchange

N. Asokan, M. Schunter, and M. Waidner."Optimistic Protocols for Fair Exchange," In Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, April 1997.

Topic 3.3
09/22/10

Topic 4. Broadcast Authentication

Topic 4.1 TESLA and EMSS

A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” in Proc. of IEEE Security and Privacy Symposium, May 2000.

(Optional) A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient and Secure Source Authentication for Multicast,” in Proceedings of Network and Distributed System Security Symposium, February 2001.

Topic 4.1
09/27/10

Mid-term Exam #1

Topics 1-3

09/29/10 Topic 4.2 BiBa Adrian Perrig, "The BiBa One-Time Signature and Broadcast Authentication Protocol," in Proceedings of the ACM Conference on Computer and Communications Security, November, 2001. Topic 4.2
10/04/10

TinyOS and nesC

Guest lecture by Sangwon Hyun

  tinyos
10/06/10

No Class
(Fall Break)

   
10/11/10

Review of Mid-term Exam #1

Topic 4.2 (Cont'd)

 
10/13/10

Topic 4.3 Message Specific Puzzles

Peng Ning, An Liu, Wenliang Du, "Mitigating DoS Attackes against Broadcast Authentication in Wireless Sensor Networks," in ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 1, February 2008. Topic 4.3
10/18/10 Topic 4.3 (Cont'd)  
10/20/10

Topic 5. Group Key Management

Topic 5.1 Group Key Agreement

M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication," in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pages 31--37, 1996.

Topic 5.1
10/25/10

Topic 5.2 Tree-Based Group DH

Y. Kim. A. Perrig and G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups." In Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM Press, Nov. 2000. Topic 5.2 ppsx
10/27/10

Topic 5.3 Group Key Distribution

Topic 6.1 Random Key Pre-Distribution

Suvo Mittra, "Iolus: a framework for scalable secure multicasting," In Proceedings of the ACM SIGCOMM '97, pages 277 - 288, 1997.

D. Wallner, E. Harder, R. Agee, "Key Management for Multicast: Issues and Architectures," IETF RFC 2627, June 1999.

(Optional) Chung Kei Wong, Mohamed Gouda, Simon S. Lam, "Secure group communications using key graphs," In Proceedings of SIGCOMM '98, Pages: 68 - 79.

Topic 5.3

Topic 6.1

11/01/10

Topic 6.1 (Cont'd)

 

L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41--47, November, 2002.

H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," in Proceedings of 2003 IEEE Symposium on Security and Privacy, May 2003.

D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 52--61, Washington D.C., October, 2003.

 
11/03/10

Topic 6.2 Secure and Resilient Location Estimation

Donggang Liu, Peng Ning, Wenliang Du, "Attack-Resistant Location Estimation in Sensor Networks," in Proceedings of The Fourth International Symposium on Information Processing in Sensor Networks (IPSN '05), pages 99 -- 106, April 2005.

Topic 6.2
11/08/10

No Class
(Instructor out of town)

Make-up lecture was given on 09/10/10.  
11/10/19

Mid-term Exam 2

Topics 4--5  
11/15/10 Topic 6.3 Secure Clock Synchronization Kun Sun, Peng Ning, Cliff Wang, An Liu, Yuzheng Zhou, "TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pages 264--277, Alexandria, Virginia, October/November 2006. Topic 6.3
11/17/10 Topic 6.4 Secure and resilient remote Programming in wireless sensor networks Sangwon Hyun, Peng Ning, An Liu, Wenliang Du, "Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks," in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), IP Track, April 2008. Topic 6.4
11/22/10

Topic 7. Miscellaneous Topics

Topic 7.1 Wireless Physical Layer Security

Optional

Yao Liu, Peng Ning, Huaiyu Dai, "Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures," in Proceedings of 2010 IEEE Symposium on Security and Privacy (Oakland '10), Oakland, CA, May 2010.

Yao Liu, Peng Ning, Huaiyu Dai, An Liu, "Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication," in Proceedings of IEEE INFOCOM 2010, March 2010, San Diego, CA, USA.

Topic 7.1
11/24/10 No Class
(Thanksgiving Holidays)

 

 
11/29/10 Topic 7.2. Infrastructure Security for Virtual Cloud Computing

Optional

Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky, "HyperSentry: Enabling Stealthy In-context Measurement of Hypervisor Integrity," in Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010), October 2010, Chicago, Il, USA.

Topic 7.2
12/01/10 Topic 7.2 (Cont'd)    
12/13/10 Final Exam Topics 1 -- 7  

 

©2010 Peng Ning . All rights reserved.