CSC/ECE 774 Advanced Network Security

Class Schedule

Note: This is a tentative schedule, and will be updated. Please check frequently.

Date Topics Reading Assignments

Topic 1. Introduction



Topic 1


Topic 2. Network Security Primitives

Topic 2.1 Absolute Basics

Topic 2.2 Hash-Based Primitives

R. Merkle. "A certified digital signature." In Advances in Cryptology -CRYPTO '89, pages 218-239, 1990.

Bloom filter (Wikipedia)

A. Juels and J. Brainard, "Client puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks." in: Proceedings of NDSS '99, 1999, pp. 151--165.

Topic 2.1

Topic 2.2-5

08/24/11 Topic 2.2 (Cont'd)

T. Aura, P. Nikander, and J. Leiwo, "DoS-Resistant Authentication with Client Puzzles." In Proceedings of the 8th International Workshop on Security Protocols, LNCS 2133, 170-177.

B. Waters, A. Juels, J. Halderman, and E. Felten, "New Client Puzzle Outsourcing Techniques for DoS Resistance." In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), 246-256.


Makeup lecture for 09/07/11
-- Room 3211 EB II

Topic 2.3 Secret Sharing

Topic 2.4 Rabin's Information Dispersal Algorithms

A. Shamir, How to share a secret, Communications of the ACM, Vol. 22, No. 11, pages 612-613, 1970.

Secret Sharing on Wikipedia

Michael O. Rabin. "Efficient dispersal of information for security, load balancing, and fault tolerance." In Journal of the ACM, Vol. 36, No. 2, 1989.


Topic 2.5 Secret Handshake

D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, and H.C.Wong."Secret handshakes from pairing-based key agreements" In IEEE Symposium on Security and Privacy, 2003.

C. Castelluccia, S. Jarecki and G. Tsudik. "Secret Handshakes from CA-oblivious Encryption." IACR AsiaCrypt'04, December 2004.


Topic 3. Broadcast Authentication

Topic 3.1 TESLA and EMSS

A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” in Proc. of IEEE Security and Privacy Symposium, May 2000.

(Optional) A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient and Secure Source Authentication for Multicast,” in Proceedings of Network and Distributed System Security Symposium, February 2001.

Topic 3.1

Makeup lecture for 10/17/11
-- Room 3211 EB II

Topic 3.2 BiBa

Topic 3.3 HORS

Adrian Perrig, "The BiBa One-Time Signature and Broadcast Authentication Protocol," in Proceedings of the ACM Conference on Computer and Communications Security, November, 2001.


Topic 3.2-3


No Class
(Labor Day)




No Class
Instructor out of town

Makeup lecture given on 08/26/11



Topic 3.3 HORS

Topic 4. Group Key Management

Topic 4.1 Group Key Agreement

L. Reyzin, N. Reyzin, “Better than Biba: Short One-Time Signatures with Fast Signing and Verifying,” in Proceedings of Australia Conference on Information Security and Privacy (ACISP ’02), Lecture Notes in Computer Science Vol. 2384, July 2002.

M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication," in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pages 31--37, 1996.

Topic 4.1

Topic 4.2 Tree-Based Group DH

Y. Kim. A. Perrig and G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups." In Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM Press, Nov. 2000. Topic 4.2

Makeup lecture for 10/19/11
-- Room 3211 EB II

Topic 4.3 Group Key Distribution

Suvo Mittra, "Iolus: a framework for scalable secure multicasting," In Proceedings of the ACM SIGCOMM '97, pages 277 - 288, 1997. Topic 4.3

Topic 4.3 (Cont'd)

Topic 5. Wireless Sensor Network Security

Topic 5.1 Random Key Pre-Distribution

D. Wallner, E. Harder, R. Agee, "Key Management for Multicast: Issues and Architectures," IETF RFC 2627, June 1999.

(Optional) Chung Kei Wong, Mohamed Gouda, Simon S. Lam, "Secure group communications using key graphs," In Proceedings of SIGCOMM '98, Pages: 68 - 79.

L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41--47, November, 2002.

Topic 5.1

Topic 5.1 (Cont'd)

H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," in Proceedings of 2003 IEEE Symposium on Security and Privacy, May 2003.

D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 52--61, Washington D.C., October, 2003.


Mid-term Exam #1

Topics 1-4


Topic 5.1 (Cont'd)



Topic 5.2 Secure and Resilient Location Estimation

Donggang Liu, Peng Ning, Wenliang Du, "Attack-Resistant Location Estimation in Sensor Networks," in Proceedings of The Fourth International Symposium on Information Processing in Sensor Networks (IPSN '05), pages 99 -- 106, April 2005.

Topic 5.2

Topic 5.3 Secure Clock Synchronization

Review of mid-term exam

Kun Sun, Peng Ning, Cliff Wang, An Liu, Yuzheng Zhou, "TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pages 264--277, Alexandria, Virginia, October/November 2006. Topic 5.3
10/10/11 Topic 5.3 (Cont'd)    

Topic 5.4 Message Specific Puzzles

Peng Ning, An Liu, Wenliang Du, "Mitigating DoS Attackes against Broadcast Authentication in Wireless Sensor Networks," in ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 1, February 2008. Topic 5.4

No Class
Instructor out of town

Makeup lecture on 09/02/11



No Class
Instructor out of town

Makeup lecture on 11/18/11



No Class
Instructor out of town

Makeup lecture on 09/16/11


Topic 5.4 (Cont'd)

Topic 5.5 Secure and resilient remote Programming in wireless sensor networks

Topic 5.5

TDLCS Lecture by
Dr. Ravi Sandu

(Room 3211, EB II)

The Data and Application Security and Privacy (DASPY) Challenge


Topic 6. Wireless Physical Layer Security

Topic 6.1 Wireless Link Signature

Yao Liu, Peng Ning, Huaiyu Dai, "Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures," in Proceedings of 2010 IEEE Symposium on Security and Privacy (Oakland '10), Oakland, CA, May 2010.

Topic 6.1
11/07/11 Topic 6.2 Recent Advances in Anti-jamming Wireless Communications

M. Strasser, C. Poper, S. Capkun, and M. Cagalj. Jamming-resistant key establishment using uncoordinated frequency hopping. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 64–78, 2008.

M. Strasser, C. Popper, and S. Capkun, “Efficient uncoordinated FHSS anti-jamming communication,” In Procceedings of MobiHoc’09, May 2009.

Topic 6.2
11/09/11 Topic 6.2 (Cont'd)

A. Liu, P. Ning, H. Dai, and Y. Liu, "USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure," in Proceedings of 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS '10), November 2010.

11/14/11 Topic 6.2 (Cont'd) C. Popper, M. Strasser, and S. Capkun, “Jamming-resistant broadcast communication without shared keys,” In Proceedings of the USENIX Security Symposium, 2009.  
11/16/11 Topic 6.2 (Cont'd) A. Liu, P. Ning, H. Dai, Y. Liu, and C. Wang, "Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure," in Proceedings of 26th Annual Computer Security Applications Conference (ACSAC 2010), December 2010.  
11/21/11 Mid-term Exam #2 Topics 1 -- 6.1  
11/23/11 No Class
(Thanksgiving Holidays)


11/28/11 In-class presentation

1. Nikunj Kela and Andrew Williams, "Ranking hackers through network traffic analysis"

2. Srinivas Tenneti, "Method for identifying mobile devices"

3. Wenbo Shen, "Using MIMO For Anti-Jamming Wireless Communication"

11/30/11 In-class presentation

4. Khiem Lam, "Profiling Hackers' Skill Level by Statistically Correlating the Relationship between TCP Connections and Snort Alerts"

5. Deepak N. Ananth and Manjusha Gadiraju, "Secure pseudonym generation for efficient broadcast authentication in VANETs"

6. Sandeep Anantha Rao and Natraj Jaganrohan, "Mitigating Primary User Emulation Attacks via Time of Emission Estimation"


Makeup lecture for 10/24/11

In-class presentation

(Room 3211, EB II)

7. Yanisa Akkarawichai and Rohan Shan, "Protecting privacy in WLAN with DoS resistance using client puzzle"

8. Nawarf Almudhahka and Mathew Locklear, "Securing The Reputation Management in WINNOWING P2P Scheme"

9. Xianqing Yu and Sabarishyam Srinivasaraju, "ToBA : Running Hadoop In Public Clouds"



©2011 Peng Ning . All rights reserved.