CSC 774 Advanced Network Security

Spring 2007

(This page will be changed frequently. Check before class.)

List of papers for in-class presentation. You may want to take a look at the grading form.

Sample mid-term exams: Exam 1; Exam 2. (Note that some questions in these exams are not in the scope of CSC 774 this semester.)

Schedule of Classes

Instructor:

Dr. Peng Ning

Office 3258 EB II, Centennial Campus

Office hours:

10:00am -- 11:00am on Tuesdays and Thursdays

Office phone:

(919) 513-4457

Fax:

(919)515-7896

Email address:

pning(at)ncsu.edu.

Homepage:

http://www.csc.ncsu.edu/faculty/ning

Teaching assistant:

Juan Du

Office hours:

Time: 11:30am - 12:30pm Mondays and Wednesdays
Location: Room 3240 EB II

Email address:

jdu(a)ncsu.edu

Class location:

EB II Room 1226

Day and time:

Tuesdays and Thursdays, 11:05am -- 12:20pm

Mailing list:

csc774-002@wolfware.ncsu.edu

Web page:

http://courses.ncsu.edu/csc774/lec/002/

Message Board:

http://courses.ncsu.edu/csc774/
Course Syllabus: http://courses.ncsu.edu/csc774/lec/002/syllabus.pdf

Note on assignments:

You must use text editor (e.g. MS Word) to complete your homework. Handwritten submissions are not accepted.

All work is to be performed individually unless otherwise specified. For the collaborative problems, you are encouraged to form teams of 1-3 members (of students in this class) to cooperate only on those problems. After discussing the problems, please write up your answers individually. Indicate the names of the other members in your team, if any.

You get no extra credit for working alone where collaboration is permitted.

In-Class Presentation:

Each student is required to give a presentation on a research paper assigned by the instructor. The list of papers can be found here.

Here is the grading form for the in-class presentation.

Term Paper :

Each student is required to complete a survey paper or a research paper. Each student needs to submit a proposal in the middle of the semester and the final version by the end of the semester. Both will be graded. Students can form teams, each with up to three members.

You are encouraged to write research papers. There will be bonus points depending on the quality of the proposal or the paper. However, you are advised that it is in general more difficult to write an original research paper than a survey paper. You are encouraged to combine this effort with their current research. You are also encouraged to discuss your work with the instructor during his office hours or by appointment.

Requirements for research/survey paper proposal 

Requirements for final research/survey paper

  • Research Paper
    • You can work on original research problems. The outcome should be a paper with original technical contribution. Your grade on this will be judged on originality, soundness of the approach, and quality of presentation. 
    • You are encouraged to choose this if you are a PhD student or a master student that has to complete a thesis.
  • Survey Paper
    • You can write a paper that surveys a particular field on information security. The outcome should be a paper that summarizes the trend in the field you have chosen. Your grade will be judged on the completeness of the survey, the quality of the trend analysis, and the quality of presentation.
  • Example Topic Areas (More will be posted):
    • Topics related to wireless sensor networks
      • Key management
      • Secure data collection
      • Intrusion detection
      • Secure location discovery
      • Secure time synchronization
      • Efficient implementation
    • Vulnerability Analysis
    • Wireless Security
    • Intrusion Detection
    • Authentication
    • DNS Security
    • Digital Watermarking
    • New Attacks

Schedule of classes

Date

Topics

Reading Assignment
(Complete before class.)

Homework Assignment

Handouts

01/10/07

Topic 1. Introduction

Topic 2. Network Security Primitives

Topic 2.1 Absolute Basics

   

Topic 1

Topic 2.1

01/16/07

Topic 2.1 (Cont'd)

Topic 2.2 Hash-Based Primitives

R. Merkle. "A certified digital signature." In Advances in Cryptology -CRYPTO '89, pages 218-239, 1990.

Bloom filter (Wikipedia)

 

 

Topic 2.2

01/18/07 Topic 2.2 (Cont'd)

A. Juels and J. Brainard, "Client puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks." in: Proceedings of NDSS '99, 1999, pp. 151--165.

 

Topic 2.2.x-ClientPuzzle

01/23/07

Topic 2.2 (Cont'd)

(Make up for 1/30 class 1/2)

T. Aura, P. Nikander, and J. Leiwo, "DoS-Resistant Authentication with Client Puzzles." In Proceedings of the 8th International Workshop on Security Protocols, LNCS 2133, 170-177.

B. Waters, A. Juels, J. Halderman, and E. Felten, "New Client Puzzle Outsourcing Techniques for DoS Resistance." In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), 246-256.

  Topic 2.2.x-Outsourcing
01/25/07

Topic 2.3 Secret Sharing

Topic 2.4 Rabin's Information Dispersal Algorithms

Topic 2.5 Secret Handshake

(Make up for 1/30 class 2/2)

A. Shamir, How to share a secret, Communications of the ACM, Vol. 22, No. 11, pages 612-613, 1970.

Secret Sharing on Wikipedia

Michael O. Rabin. "Efficient dispersal of information for security, load balancing, and fault tolerance." In Journal of the ACM, Vol. 36, No. 2, 1989.

D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, and H.C.Wong."Secret handshakes from pairing-based key agreements." In IEEE Symposium on Security and Privacy, 2003.

C. Castelluccia, S. Jarecki and G. Tsudik. "Secret Handshakes from CA-oblivious Encryption." IACR AsiaCrypt'04, December 2004.

 

Topic 2.4

Topic 2.5 (pdf)

01/30/07

No Class

     
02/01/07

Topic 2.5 (Cont'd)

 

Homework Assignment #1

TA's reference solution

 

02/06/07

Topic 2.6 ID-Based Cryptography

Adi Shamir. "Identity-Based Cryptosystems and Signature Schemes." Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, 7:47--53, 1984.

Dan Boneh, Matthew K. Franklin, "Identity-Based Encryption from the Weil Pairing." Advances in Cryptology - Proceedings of CRYPTO 2001 (2001).

 

Topic 2.6 #1

Topic 2.6 #2

02/08/07

Topic 2.6 (Cont'd)

 

 
02/13/07

Topic 2.6 (Cont'd)

Topic 3. Electronic Payment Systems

Topic 3.1 NetBill

Benjamin Cox, J.D. Tygar, and Marvin Sirbu. "Netbill Security and Transaction Protocol," In The First USENIX Workshop on Electronic Commerce, pages 77--88, July 1995.

  Topic 3.1
02/15/07

Mid-term Exam #1

Topics 1-2.6    
02/20/07

Topic 3.1 (Cont'd)

Topic 3.2 Micropayment

R.L. Rivest, A. Shamir, "PayWord and MicroMint: Two simple micropayment schemes," In Proceedings of Security Protocols Workshop, pages 69 - 87, 1996.

(optional) Silvio Micali and Ronald Rivest. Micropayments revisited. In Bart Preneel, editor, Progress in Cryptology --- CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science. Springer-Verlag, February 18-22 2002.

  Topic 3.2
02/22/07

 

 

 

 
02/27/07

Topic 3.3 Fair Exchange

 

N. Asokan, M. Schunter, and M. Waidner."Optimistic Protocols for Fair Exchange," In Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, April 1997.

  Topic 3.3
03/01/07

Topic 4. Broadcast Authentication

Topic 4.1 TESLA and EMSS

A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” in Proc. of IEEE Security and Privacy Symposium, May 2000.

(Optional) A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient and Secure Source Authentication for Multicast,” in Proceedings of Network and Distributed System Security Symposium, February 2001.

(Optional) Guy Fawkes Protocol -- R. Anderson, F. Bergadano, B. Crispo, J.H. Lee, C. Manifavas,and R. Needham, "A New Family of Authentication Protocols".

  Topic 4.1
03/06/07 No Class
(Spring Break)
     
03/08/07 No Class
(Spring Break)
     
03/13/07

Topic 4.1 (Cont'd)

 

 

Homework Assignment #2

TA's reference solution

Topic 4.2
03/15/07 Topic 4.2 BiBa

Adrian Perrig, "The BiBa One-Time Signature and Broadcast Authentication Protocol," in Proceedings of the ACM Conference on Computer and Communications Security, November, 2001.

 
03/20/07

Topic 4.2 (Cont'd)

Topic 4.3 Message Specific Puzzles

Peng Ning, An Liu, Wenliang Du, "Mitigating DoS Attackes against Broadcast Authentication in Wireless Sensor Networks," Manuscript under submission.

Proposal for research paper due (Deadline extended) Topic 4.3
03/22/07

Topic 4.3 (Cont'd)

Topic 5. Group Key Management

Topic 5.1 Group Key Agreement

M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman Key Distribution Extended to Group Communication,” in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pages 31--37, 1996.

  Topic 5.1
03/27/07

Guest Lecture

Gary McGraw, Cigital

Time: 11:15am -- 12:30pm

Location: Room 313, MRC, NCSU Centennial Campus

Exploiting Online Games

   
03/29/07

Topic 5.1 (Cont'd)

 

Homework Assignment #3

TA's reference solution

04/03/07

Topic 5.2 Tree-Based Group DH

Y. Kim. A. Perrig and G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups." In Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM Press, Nov. 2000.

  Topic 5.2
04/05/07

No Class

 

 

 
04/10/07

Topic 5.3 Group Key Distribution

Topic 6. Random Key Pre-Distribution

Suvo Mittra, "Iolus: a framework for scalable secure multicasting," In Proceedings of the ACM SIGCOMM '97, pages 277 - 288, 1997.

D. Wallner, E. Harder, R. Agee, "Key Management for Multicast: Issues and Architectures," IETF RFC 2627, June 1999.

(Optional) Chung Kei Wong, Mohamed Gouda, Simon S. Lam, "Secure group communications using key graphs," In Proceedings of SIGCOMM '98, Pages: 68 - 79.

L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41--47, November, 2002.

HW#4

TA's reference solution

Topic 5.3

Topic 6

04/12/07 Topic 6 (Cont'd)

H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," in Proceedings of 2003 IEEE Symposium on Security and Privacy, May 2003.

D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 52--61, Washington D.C., October, 2003.

   
04/17/07 Mid-term Exam #2 Topics 3--6    
04/19/07 Advanced Topics
(Make up for class on 4/5/07)

1. Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, and J.D. Tygar, "Distillation Codes and Applications to DoS Resistant Multicast Authentication", In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), February 2004.

2. Elaine Shi, John Bethencourt, Hubert Chan, Dawn Song, and Adrian Perrig, "Multi-Dimensional Range Query over Encrypted Data," To appear in IEEE Symposium on Security and Privacy, May, 2007.

3. Donggang Liu, Peng Ning, Kun Sun, "Efficient Self-Healing Group Key Distribution with Revocation Capability," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 231--240, Washington D.C., October, 2003.

4. Dalit Naor, Moni Naor, Jeff Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers", in Lecture Notes in Computer Science, volume 2139, pages 41--??, 2001.

 

JeeHyung Huang

 

Zhi Michael Chen

 

Archana Rajagopal

 

Attila Yavuz

04/24/07 Advanced Topics

5. Haowen Chan, Adrian Perrig, and Dawn Song.
"Secure Hierarchical In-Network Aggregation in Sensor Networks" In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, Virginia, October 30 - November 3, 2006.

6. Bryan Parno, Adrian Perrig, Vilgil Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," in Proceedings of 2005 IEEE Symposium on Security and Privacy, May 2005.

7. Y. Yang, X. Wang, S. Zhu, and G. Cao, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," In Proc. of ACM MOBIHOC'06, May 2006.

 

Steve McKinney

 

Kirtesh Patil

 

Nicky Mahalani

 

04/26/07 Advanced Topics

8. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," In Proceedings of the INFOCOM 2003.

9. Lingxuan Hu and David Evans, "Using Directional Antennas to Prevent Wormhole Attacks," In Proceedings of NDSS '04.

10. Kun Sun, Peng Ning, Cliff Wang, An Liu, Yuzheng Zhou, "TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pages 264--277, Alexandria, Virginia, October/November 2006.

 

Varagur Karthik Iyer

 

Stephen Thomas

 

Sangwon Hyun

05/05/07     Research Paper Due  

©Copyright 2007, Peng Ning