CSC 774 Advanced Network Security

Spring 2007

Presentations for the Advanced Topics

Grading policy for presentations

You can get most of the papers by following the links or searching in our library or citeseer.

You can choose any paper if it hasn't been assigned. Requests are accommodated in the order in which they are received. If you don't decide by April 10, the instructor will assign a paper to you.

Each of you will have about 20 minutes to present the paper, and 5 minutes for questions and answers. You can use your questions/answers time for presentation. However, if you don't leave enought time for questions and answers, you may lose points for that.

You need to send your presentation slides in ppt or pdf to the instructor at least 3 days prior to your presentation. Late submission will result in penalty.

Keywords
Tentative Schedule
Paper
Presenter
1
Broadcast authentication, DoS attacks
04/19/07
Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, and J.D. Tygar, "Distillation Codes and Applications to DoS Resistant Multicast Authentication", In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), February 2004.
Jee-Hyung Huang
2
Secure time synchronization, local broadcast authentication, sensor network security

04/19/07

Kun Sun, Peng Ning, Cliff Wang, An Liu, Yuzheng Zhou, "TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pages 264--277, Alexandria, Virginia, October/November 2006.
Sangwon Hyun
3
Cryptography, search over encrypted data
04/19/07
Elaine Shi, John Bethencourt, Hubert Chan, Dawn Song, and Adrian Perrig, "Multi-Dimensional Range Query over Encrypted Data," To appear in IEEE Symposium on Security and Privacy, May, 2007.
Zhi Michael Chen
4
Group key distribution
04/19/07
Donggang Liu, Peng Ning, Kun Sun, "Efficient Self-Healing Group Key Distribution with Revocation Capability," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 231--240, Washington D.C., October, 2003.
Archana Rajagopal
5
Group key distribution
04/19/07
Dalit Naor, Moni Naor, Jeff Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers", in Lecture Notes in Computer Science, volume 2139, pages 41--??, 2001.
Attila Yavuz
6
Sensor network security, secure aggregation
04/24/07
Haowen Chan, Adrian Perrig, and Dawn Song.
"Secure Hierarchical In-Network Aggregation in Sensor Networks" In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, Virginia, October 30 - November 3, 2006.
Steve McKinney
7
sensor network security, node replication detection
04/24/07
Bryan Parno, Adrian Perrig, Vilgil Gligor, "Distributed Detection of Node Replication Attacks in Sensor Networks," in Proceedings of 2005 IEEE Symposium on Security and Privacy, May 2005.
Kirtesh Patil
8
Sensor network security, secure aggregation
04/24/07
Y. Yang, X. Wang, S. Zhu, and G. Cao, "SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks," In Proc. of ACM MOBIHOC'06, May 2006.
Nicky Mahalani
9
Ad hoc network security, wormhole ttacks
04/26/07
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," In Proceedings of the INFOCOM 2003.
Varagur Karthik Iyer
10
Ad hoc network security, wormhole attacks
04/26/07
Lingxuan Hu and David Evans, "Using Directional Antennas to Prevent Wormhole Attacks," In Proceedings of NDSS '04.
Stephen Thomas