CSC/ECE 774 Advanced Network Security

Class Schedule

Note: This is a tentative schedule, and will be updated. Please check frequently.

Date Topics Reading Assignments

Topic 1. Introduction




Topic 1


Topic 2. Network Security Primitives

Topic 2.1 Absolute Basics

R. Merkle. "A certified digital signature." In Advances in Cryptology -CRYPTO '89, pages 218-239, 1990.

Bloom filter (Wikipedia)

A. Juels and J. Brainard, "Client puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks." in: Proceedings of NDSS '99, 1999, pp. 151--165.

Topic 2.1

01/15/09 Topic 2.2 Hash-Based Primitives

T. Aura, P. Nikander, and J. Leiwo, "DoS-Resistant Authentication with Client Puzzles." In Proceedings of the 8th International Workshop on Security Protocols, LNCS 2133, 170-177.

B. Waters, A. Juels, J. Halderman, and E. Felten, "New Client Puzzle Outsourcing Techniques for DoS Resistance." In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), 246-256.

Topic 2.2

Topic 2.2.x-ClientPuzzle (ppt)


Class cancelled due to adverse weather

Make-up will be announced later.



Topic 2.2 (Cont'd)




Topic 2.2 (Cont'd)

Topic 2.3 Secret Sharing

Topic 2.4 Rabin's Information Dispersal Algorithms

A. Shamir, How to share a secret, Communications of the ACM, Vol. 22, No. 11, pages 612-613, 1970.

Secret Sharing on Wikipedia

Michael O. Rabin. "Efficient dispersal of information for security, load balancing, and fault tolerance." In Journal of the ACM, Vol. 36, No. 2, 1989.

Topic 2.3

Topic 2.4 (pps)


Topic 2.4 (Cont'd)

Topic 2.5 Secret Handshake

D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, and H.C.Wong."Secret handshakes from pairing-based key agreements." In IEEE Symposium on Security and Privacy, 2003.

C. Castelluccia, S. Jarecki and G. Tsudik. "Secret Handshakes from CA-oblivious Encryption." IACR AsiaCrypt'04, December 2004.

Topic 2.5

02/03/09 Topic 2.5 (Cont'd)    

Topic 2.6 ID-Based Cryptography

Adi Shamir. "Identity-Based Cryptosystems and Signature Schemes." Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, 7:47--53, 1984.

Dan Boneh, Matthew K. Franklin, "Identity-Based Encryption from the Weil Pairing." Advances in Cryptology - Proceedings of CRYPTO 2001 (2001).

Topic 2.6.1

Topic 2.6.2

02/10/09 Topic 2.6 (Cont'd)    

Mid-term Exam #1

Topics 1-2  

Review of mid-term exam questions

Topic 3. Electronic Payment Systems

Topic 3.1 NetBill

Benjamin Cox, J.D. Tygar, and Marvin Sirbu. "Netbill Security and Transaction Protocol," In The First USENIX Workshop on Electronic Commerce, pages 77--88, July 1995.

Topic 3.1


Topic 3.1 (Cont'd)


TinyOS and nesC

Guest lecture by An Liu


Topic 3.2 Micropayment

R.L. Rivest, A. Shamir, "PayWord and MicroMint: Two simple micropayment schemes," In Proceedings of Security Protocols Workshop, pages 69 - 87, 1996.

(optional) Silvio Micali and Ronald Rivest. Micropayments revisited. In Bart Preneel, editor, Progress in Cryptology --- CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science. Springer-Verlag, February 18-22 2002.

Topic 3.2
03/03/09 No Class
(Spring Break)
03/05/09 No Class
(Spring Break)

Topic 3.3 Fair Exchange

N. Asokan, M. Schunter, and M. Waidner."Optimistic Protocols for Fair Exchange," In Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, April 1997.

Topic 3.3

Topic 4. Broadcast Authentication

Topic 4.1 TESLA and EMSS

A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels,” in Proc. of IEEE Security and Privacy Symposium, May 2000.

(Optional) A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient and Secure Source Authentication for Multicast,” in Proceedings of Network and Distributed System Security Symposium, February 2001.

Topic 4.1

(Makeup lectures - 1/20 & 4/21)

Topic 4.2 BiBa

Adrian Perrig, "The BiBa One-Time Signature and Broadcast Authentication Protocol," in Proceedings of the ACM Conference on Computer and Communications Security, November, 2001.

Topic 4.2


Topic 4.3 Message Specific Puzzles

Peng Ning, An Liu, Wenliang Du, "Mitigating DoS Attackes against Broadcast Authentication in Wireless Sensor Networks," in ACM Transactions on Sensor Networks (TOSN), Vol. 4, No. 1, February 2008.

Topic 4.3


Topic 4.4 Secure and resilient remote Programming in wireless sensor networks -- An application of broadcast authentication

Sangwon Hyun, Peng Ning, An Liu, Wenliang Du, "Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks," in Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), IP Track, April 2008.

Topic 4.4


Topic 4.4 (Cont'd)

Topic 5. Group Key Management

Topic 5.1 Group Key Agreement

M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman Key Distribution Extended to Group Communication,” in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pages 31--37, 1996. Topic 5.1

Topic 5.1 (Cont'd)


Topic 5.2 Tree-Based Group DH


Y. Kim. A. Perrig and G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups." In Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM Press, Nov. 2000.

Topic 5.2 ppt


Topic 5.3 Group Key Distribution

Suvo Mittra, "Iolus: a framework for scalable secure multicasting," In Proceedings of the ACM SIGCOMM '97, pages 277 - 288, 1997.

D. Wallner, E. Harder, R. Agee, "Key Management for Multicast: Issues and Architectures," IETF RFC 2627, June 1999.

(Optional) Chung Kei Wong, Mohamed Gouda, Simon S. Lam, "Secure group communications using key graphs," In Proceedings of SIGCOMM '98, Pages: 68 - 79.

Topic 5.3 ppt

Topic 6. Sensor Network Security

Topic 6.1 Random Key Pre-Distribution

L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41--47, November, 2002.

H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," in Proceedings of 2003 IEEE Symposium on Security and Privacy, May 2003.

D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 52--61, Washington D.C., October, 2003.

Topic 6.1

04/09/09 Topic 6.2 Secure and Resilient Location Estimation Donggang Liu, Peng Ning, Wenliang Du, "Attack-Resistant Location Estimation in Sensor Networks," in Proceedings of The Fourth International Symposium on Information Processing in Sensor Networks (IPSN '05), pages 99 -- 106, April 2005. Topic 6.2
(Makeup lectures - for 4/23)

Topic 6.3 Secure Clock Synchronization

Where: room 3211 EB II

When: 10am--11:15am

Kun Sun, Peng Ning, Cliff Wang, An Liu, Yuzheng Zhou, "TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks," in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pages 264--277, Alexandria, Virginia, October/November 2006. Topic 6.3
04/14/09 Review    
04/16/09 Mid-term Exam #2

Topics 3--6

04/21/09 No class    
04/23/09 No class    


©2009 Peng Ning . All rights reserved.