CSC 774 Advanced Network Security
|
|
- Joseph Pitts
- 8 years ago
- Views:
Transcription
1 CSC 774 Advanced Network Security 1. Instructor: Dr. Peng Ning, Office: 3258 EB II, Centennial Campus Phone: (919) URL: Office hours: See course website Syllabus 2. Course Objectives: By the end of this course, students will be able to: 1. List the common threats and vulnerabilities of networked systems 2. Describe the following electronic payment systems: NetBill, PayWords, MicroMint, fair exchange protocols. 3. Describe and give examples of broadcast authentication protocols. 4. Explain the two types of group management techniques: group key agreement and group key distribution. 5. Describe the following group key management protocols: Group Diffie-Hellman protocol, Tree-based Group Diffie-Hellman protocol, LKH, and SDR. 6. Explain at least on secure MANET routing protocol. 7. Describe security mechanisms for secure routing in MANET. 8. Explain at least one approach to detecting selfish nodes in MANET. 9. Describe µtesla, the broadcast authentication protocol for sensor networks. 10. Explain the following key pre-distribution protocols for sensor networks: random key predistribution scheme, q-composite scheme, random pairwise keys scheme, polynomial pool based random key predistribution scheme. 11. Explain the techniques for secure and resilient location estimation in wireless sensor networks. 12. Explain client puzzle and its effects on denial of service (DoS) attacks. 13. Use client puzzles to mitigate potential DoS attacks. 14. Use one-way function chains, collisions of one-way function images, and Merkle hash tree to provide authentication. 15. Identify flaws in cryptographic protocols. 3. Text: No textbook is required. Handouts (All handouts are available on-line): 1. R. Merkle. "A digital signature based on a conventional encryption function." In Advances in Cryptology -CRYPTO '87, pages , R. Merkle. "A certified digital signature." In Advances in Cryptology -CRYPTO '89, pages , 1990.
2 3. A. Juels and J. Brainard, "Client puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks." in: Proceedings of NDSS '99, 1999, pp T. Aura, P. Nikander, and J. Leiwo, "DoS-Resistant Authentication with Client Puzzles." In Proceedings of the 8th International Workshop on Security Protocols, LNCS 2133, X. Wang, and M. Reiter, "Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles." In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), B. Waters, A. Juels, J. Halderman, and E. Felten, "New Client Puzzle Outsourcing Techniques for DoS Resistance." In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), Adi Shamir. "Identity-Based Cryptosystems and Signature Schemes." Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, 7:47--53, Dan Boneh, Matthew K. Franklin, "Identity-Based Encryption from the Weil Pairing." Advances in Cryptology - Proceedings of CRYPTO Carlo Blundo, Paolo D'Arco, Antonio Giorgio Gaggia. "A τ-restricted Key Agreement Scheme." The Computer Journal, Volume 42, No.1, page , C. Castelluccia, S. Jarecki and G. Tsudik. "Secret Handshakes from CA-oblivious Encryption." IACR AsiaCrypt'04, December D. Balfanz, G. Durfee, N. Shankar, D.K. Smetters, J. Staddon, and H.C.Wong. "Secret handshakes from pairing-based key agreements." In IEEE Symposium on Security and Privacy, Michael O. Rabin. "Efficient dispersal of information for security, load balancing, and fault tolerance." In Journal of the ACM, Vol. 36, No. 2, B. Cox, J.D. Tygar, and M. Sirbu. Netbill Security and Transaction Protocol, In The First USENIX Workshop on Electronic Commerce, pages , July R. Rivest and A. Shamir, PayWord and MicroMint: Two simple micropayment schemes, in Proceedings of Security Protocols Workshop, pages: 69 87, S. Micali and R. Rivest. Micropayments revisited. In Bart Preneel, editor, Progress in Cryptology --- CT-RSA 2002, Lecture Notes in Computer Science, Vol Springer- Verlag, February 18 22, N. Asokan, M. Schunter, and M. Waidner. Optimistic Protocols for Fair Exchange, In Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, April A. Perrig, R. Canetti, D. Song, and D. Tygar, Efficient Authentication and Signing of Multicast Streams over Lossy Channels, in Proc. of IEEE Security and Privacy Symposium, May A. Perrig, R. Canetti, D. Song, and D. Tygar, Efficient and Secure Source Authentication for Multicast, in Proceedings of Network and Distributed System Security Symposium, February A. Perrig, "The BiBa One-Time Signature and Broadcast Authentication Protocol," in Proceedings of the ACM Conference on Computer and Communications Security, November M. Steiner, G. Tsudik, and M. Waidner, Diffie-Hellman Key Distribution Extended to Group Communication, in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pages , Y. Kim, A. Perrig and G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, in Proceedings of the 7th ACM Conference on Computer and Communications Security, pages , 2000.
3 22. Suvo Mittra, "Iolus: a framework for scalable secure multicasting," In Proceedings of the ACM SIGCOMM '97, pages , Chung Kei Wong, Mohamed Gouda, Simon S. Lam, "Secure group communications using key graphs," In Proceedings of SIGCOMM '98, pages: Y. Hu, A. Perrig, and D. B. Johnson, Ariadne: A Secure On-Demand Routing Protocol for Ad~Hoc Networks, in Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), September, Yih-Chun Hu, Adrian Perrig, David Johnson, "Efficient Security Mechanisms for Routing Protocols", In Proceedings of NDSS S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pages , L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pages , November, H. Chan, A. Perrig, and D. Song, Random Key Predistribution Schemes for Sensor Networks, in Proceedings of IEEE Symposium on Research in Security and Privacy, pages , May D. Liu and P. Ning, Establishing Pairwise Keys in Distributed Sensor Networks, in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages , Washington D.C., October, Bartosz Przydatek, Dawn Song, Adrian Perrig, "SIA: Secure Information Aggregation in Sensor Networks", In Proceedings of ACM SenSys Donggang Liu, Peng Ning, Wenliang Du, "Attack-Resistant Location Estimation in Sensor Networks," in Proceedings of The Fourth International Symposium on Information Processing in Sensor Networks (IPSN '05), pages , April Donggang Liu, Peng Ning, Wenliang Du, "Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks," in Proceedings of the The 25th International Conference on Distributed Computing Systems (ICDCS '05), pages , June A. Juels and J. Brainard, "Client puzzels: A cryptographic countermeasure against connection depletion attacks," In Proceedings of the 6th Network and Distributed Systems Security Symposium (NDSS 99), February P. MacKenzie and M. K. Reiter. Delegation of cryptographic servers for capture-resilient devices. Distributed Computing 16(4): , December P. MacKenzie and M. K. Reiter. Networked cryptographic devices resilient to capture. International Journal of Information Security, 2(1):1 20, November M. K. Reiter, A. Samar, and C. Wang. The design and implementation of a JCAcompliant capture protection infrastructure. In Proceedings of the 22nd IEEE Symposium on Reliable Distributed Systems, October Course Organization and Scope: (Assume each lecture takes 75 minutes. The following topics need 30 lectures (or 15 weeks).) Introduction to network security (1 lecture) o Basic concepts: security services, security mechanisms, etc. o Scope of course 2. Network Security Primitives (5 lectures) o Absolute basics: Secret key and public key cryptosystems (RSA, DSA, Diffie- Hellman key exchange), one-way hash function
4 o One-way key chain, Merkle hash tree o Traditional key distribution techniques (Key distribution center, Certificate based key distribution) o Client puzzles o Zero-knowledge proof o Bloom filter o Secret sharing o ID-based cryptography o Secret handshake o Rabin s information dispersal algorithm 3. Electronic payment systems (3 lectures) o Electronic billing systems o Micropayments o Fair exchange protocols 4. Broadcast authentication (2 lectures) o TESLA and EMSS o BiBa 5. Group key management (4 Lectures) o Basic concepts in group key management o Group key agreement protocols (GDH, B-D protocols, TGDH) o Group key distribution protocols (LKH, secret-sharing based protocols, SDR) 6. Security in ad-hoc networks (4 lectures) o Secure ad-hoc routing protocols o Detecting selfish or malicious nodes o Broadcast authentication o Key management for sensor networks o Secure location verification 7. Network intrusion detection (1 lecture) o Intrusion alert correlation 8. In-class presentations of advanced topics (10 lectures) o Topics selected by the instructor on a per-semester basis o Students present the above topics individually or in group (depending on enrollment) o 25 minutes per presentation (3 presentations per lecture) o See Section H for grading policy for in-class presentations 5. Schedule of Reading Assignments: See schedule of classes on course website. 6. Schedule of homework due dates, quizzes and exams: There are five homework assignments and two exams. Quizzes are given in the form of popup quizzes. Pop-up quizzes are adopted to encourage the students to study during the nonexam weeks. The results are not counted in the final grade. Homework 1: See schedule of classes on course website. Mid-term exam #1: week 6
5 Mid-term exam #2: week 12 Term paper: end of semester. 7. Grading: Assignments: 10%; midterm #1: 25%; midterm #2: 25%; research paper: 30%; in-class presentation: 10%. The final grades are computed according to the following rules: o A+: >= 95% o A: >= 90% and < 95% o A-: >= 85% and < 90% o B+: >= 80% and < 85% o B: >= 75% and < 80% o B-: >= 70% and < 75% o C+: >= 66% and < 70% o C: >= 63% and < 66% o C-: >= 60% and < 63% o D+: >= 56% and < 60% o D: >= 53% and < 56% o D-: >= 50% and < 53% o F: < 50%. 8. Policies on incomplete grades and late assignments: Homework and project deadlines will be hard. Late homework will be accepted with a 10% reduction in grade for each class period they are late by. However, once a homework assignment is discussed in class, submissions will no longer be accepted. All assignments must be turned in before the start of class on the due date. 9. Policies on absences (excused and unexcused) and scheduling makeup work: You may be excused from an exam only with a university approved condition, with proof. For example, if you cannot take an exam because of a sickness, we will need a doctor's note. Events such as going on a business trip or attending a brother's wedding are not an acceptable excuse for not taking an exam at its scheduled time and place. You will have one chance to take a makeup exam if your absence is excused. There will be no makeup for homework assignments. 10. Course prerequisites: CSC 570 Computer Networks, CSC 574 Information Systems Security 11. Academic integrity: The university, college, and department policies against academic dishonesty will be strictly enforced. You may obtain copies of the NCSU Code of Student Conduct from the Office of Student Conduct, or from the following URL.
6 12. NC State policy on working with students with disabilities: Reasonable accommodations will be made for students with verifiable disabilities. In order to take advantage of available accommodations, students must register with Disability Service for Students at 1900 Student Health Center, Campus Box 7509, For more information on NC State s policy on working with students with disabilities, please see Laboratory Safety or Risk Assumption: Not Applicable. 14. Pass-through Charges: Not applicable.
CSC 474 Information Systems Security
CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning pning@ncsu.edu (919)513-4457 Office: Room
More informationEfficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
More informationWireless Network Security 14-814 Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property
More informationEFS: Enhanced FACES Protocol for Secure Routing In MANET
EFS: Enhanced FACES Protocol for Secure Routing In MANET Geethu Bastian Department of Information Technology Rajagiri School of Engineering & Technology, Rajagiri Valley P O Kochi-39, India geethubastian@gmail.com
More informationCSE 5392 Sensor Network Security
About Instructor CSE 5392 Sensor Network Security Course Introduction Dr. Donggang Liu, assistant professor, CSE department http://ranger.uta.edu/~dliu dliu@cse.uta.edu Tel: (817) 272-0741 Office: 330NH
More informationA Secure Intrusion Avoidance System Using Hybrid Cryptography
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationSoran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
More informationTHIS: THreshold security for Information aggregation in Sensor networks
THIS: THreshold security for Information aggregation in Sensor networks Hai Vu Neeraj Mittal S. Venkatesan Department of Computer Science The University of Texas at Dallas Richardson, TX 75083, USA hai.vu@student.utdallas.edu
More informationMANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
More informationCIS 6930/4930 Computer and Network Security. Dr. Yao Liu
CIS 6930/4930 Computer and Network Security Dr. Yao Liu About Instructor Dr. Yao Liu, Office: ENB 336 Phone: 813-974-1079 Email: yliu@cse.usf.edu URL: http://www.cse.usf.edu/~yliu/ Office hour: TR 2:00pm
More informationMajor prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.
Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part
More informationLecture 25: Pairing-Based Cryptography
6.897 Special Topics in Cryptography Instructors: Ran Canetti and Ron Rivest May 5, 2004 Lecture 25: Pairing-Based Cryptography Scribe: Ben Adida 1 Introduction The field of Pairing-Based Cryptography
More informationBabel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang
More information3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1
Sensor Network Security 3/25/2014 Sensor Network Security (Simon S. Lam) 1 1 References R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84,
More informationStrengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
More informationGroup Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India
More informationA Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems
The 28th International Conference on Distributed Computing Systems Workshops A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems Zhong Xu Xue Liu School of Computer Science McGill
More informationSecured Communication in Wireless Sensor Networks
Secured Communication in Wireless Sensor Networks Jian Wang \ University of Teas at Arlington, Arlington, TX 77843 Email: {wang_jane@lycos.com} Abstract Recent advancement in wireless communications and
More informationCSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun
CSCI 454/554 Computer and Network Security Instructor: Dr. Kun Sun About Instructor Dr. Kun Sun, Assistant Professor of Computer Science http://www.cs.wm.edu/~ksun/ Phone: (757) 221-3457 Email: ksun@wm.edu
More informationSecure Negotiation for Manual Authentication Protocols
Secure Negotiation for Manual Authentication Protocols Milica Milutinovic 1, Roel Peeters 2, and Bart De Decker 1 1 K.U.Leuven, Dept. of Computer Science, DistriNet/SecAnon, firstname.lastname@cs.kuleuven.be,
More informationVerifying Data Integrity in Peer-to-Peer Video Streaming
Verifying Data Integrity in Peer-to-Peer Video Streaming Ahsan Habib, Dongyan Xu, Mikhail Atallah, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue University, West Lafayette, IN 47907
More informationProtecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationIdentity-Based Key Agreement and Encryption For Wireless Sensor Networks
182 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 Identity-Based Key Agreement and Encryption For Wireless Sensor Networks Geng Yang 1, Chunming Rong 2, Christian
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
More informationAriadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationElectronic Contract Signing without Using Trusted Third Party
Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore
More informationAbout the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
More informationSECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
More informationSecuring Ad hoc Routing Protocols
Securing Ad hoc Routing Protocols Frank Kargl Stefan Schlott Andreas Klenk Alfred Geiss Michael Weber Department of Media Informatics, University of Ulm, Germany Email: surname.givenname@informatik.uni-ulm.de
More informationLecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
More informationEfficient Online/Offline Identity-Based Signature for Wireless Sensor Network
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network Joseph K. Liu Joonsang Baek Jianying Zhou Yanjiang Yang Jun Wen Wong Institute for Infocomm Research Singapore {ksliu, jsbaek,
More informationVulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection
More informationA Survey on Optimistic Fair Digital Signature Exchange Protocols
A Survey on Optimistic Fair Digital Signature Exchange s Alfin Abraham Vinodh Ewards Harlay Maria Mathew Abstract Security services become crucial to many applications such as e-commerce payment protocols,
More informationWireless sensor network
SECURITY IN WIRELESS SENSOR NETWORKS By ADRIAN PERRIG, JOHN STANKOVIC, and DAVID WAGNER They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service,
More informationDevelopment of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
More informationReusable Anonymous Return Channels
Reusable Anonymous Return Channels Philippe Golle Stanford University Stanford, CA 94305, USA pgolle@cs.stanford.edu Markus Jakobsson RSA Laboratories Bedford, MA 01730, USA mjakobsson@rsasecurity.com
More informationCertificate Management in Ad Hoc Networks
Certificate Management in Ad Hoc Networks Matei Ciobanu Morogan, Sead Muftic Department of Computer Science, Royal Institute of Technology [matei, sead] @ dsv.su.se Abstract Various types of certificates
More informationAuthenticating Real Time Packet Streams and Multicasts
Authenticating Real Time Packet Streams and Multicasts Alain Pannetrat, Réfik Molva Institut Eurécom, Sophia-Antipolis, France. Abstract In this work we propose a new stream authentication scheme that
More informationA Mobile Ticket System Based on Personal Trusted Device
A Mobile Ticket System Based on Personal Trusted Device Yu-Yi Chen 1, Chin-Ling Chen 2,* Jinn-Ke Jan 3 1. Department of Management Information Systems, National Chung Hsing University, Taichung, Taiwan
More informationTextbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
More informationAnonymous ID-based Group Key Agreement for Wireless Networks
Anonymous ID-based Group Key Agreement for Wireless Networks Zhiguo Wan,KuiRen, Wenjing Lou and Bart Preneel K.U.Leuven, ESAT/SCD, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium Email: {zhiguo.wan,bart.preneel}@esat.kuleuven.be
More informationOn the Security of Wireless Sensor Networks
On the Security of Wireless Sensor Networks Rodrigo Roman 1, Jianying Zhou 1, and Javier Lopez 2 1 Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613 roman@lcc.uma.es, jyzhou@i2r.a-star.edu.sg
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
More informationApplication of Electronic Currency on the Online Payment System like PayPal
Application of Electronic Currency on the Online Payment System like PayPal Rafael Martínez Peláez, Francisco J. Rico Novella Technical University of Catalonia (UPC), Department of Telematics Engineering
More informationSecure and Efficient Data Collection in Sensor Networks
Secure and Efficient Data Collection in Sensor Networks Cristina Cano 1, Manel Guerrero 2, Boris Bellalta 1 (1) Universitat Pompeu Fabra (2) Universitat Politecnica de Catalunya cristina.cano@upf.edu,
More informationImproving Availability of Secure Wireless Sensor Networks
SETIT 2007 4 th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 25-29, 2007 TUNISIA Improving Availability of Secure Wireless Sensor Networks
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationTitle Security Related Issues for Cloud Computing
Title Security Related Issues for Cloud Computing Ashwini Singh Abstract: The term CLOUD implies Common Location Independent Online Utility on Demand. It's a rising innovation in IT commercial ventures.
More informationInternational Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
More informationIII. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,
More informationDetecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Donggang Liu Peng Ning North Carolina State University {dliu,pning}@ncsu.edu Wenliang Du Syracuse University wedu@ecs.syr.edu
More informationCERIAS Tech Report 2007-04
CERIAS Tech Report 2007-04 SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION by Mohit Saxena Center for Education and Research in Information Assurance and Security, Purdue University,
More informationWireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
More informationSelective dependable storage services for providing security in cloud computing
Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,
More informationA Scheme for Analyzing Electronic Payment Systems
A Scheme for Analyzing Electronic Payment Systems Lucas de Carvalho Ferreira IC/Unicamp and DEX/UFLA DEX, Campus da UFLA 37200-000 Lavras MG Brasil lucasf@ufla.br Ricardo Dahab IC/Unicamp Caixa Postal
More informationAshok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationReverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes 1 Introduction Kemal BICAKCI bicakci@metu.edu.tr Informatics Institute, Middle East Technical University, Ankara, TURKEY Bruno
More informationAN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM Bairu Ravi 1, B.Ramya 2 1 M.Tech Student, Dept of CSE, Arjun College
More informationSECURITY IN WIRELESS SENSOR NETWORKS IMPROVING THE LEAP PROTOCOL
SECURITY IN WIRELESS SENSOR NETWORKS IMPROVING THE LEAP PROTOCOL Delan Alsoufi 1, Khaled Elleithy 1, Tariq Abuzaghleh 2 and Ahmad Nassar 1 1 Department of Computer Engineering, University of Bridgeport,
More informationSignature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
More informationAuthenticated In-Network Programming for Wireless Sensor Networks
Authenticated In-Network Programming for Wireless Sensor Networks Ioannis Krontiris and Tassos Dimitriou Athens Information Technology, P.O.Box 68, 19.5 km Markopoulo Ave., GR- 19002, Peania, Athens, Greece
More informationSecure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
More informationNeighborhood-Based Security Protocol for Wireless Sensor Networks
The 6th International Conference on Information Technology and pplications (ICIT 2009) Neighborhood-Based Security Protocol for Wireless Sensor Networks Di Zhang, Ung Heo, Yi Zhao, Kang Soo You* and Jaeho
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationData Grid Privacy and Secure Storage Service in Cloud Computing
Data Grid Privacy and Secure Storage Service in Cloud Computing L.Revathi 1, S.Karthikeyan 2 1 Research Scholar, Department of Computer Applications, Dr. M.G.R. Educational and Research Institute University,
More informationBreaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
More informationHow To Ensure Data Integrity In Clouds
Proficient Audit Services Outsourced for Data Availability in Clouds N Praveen Kumar Reddy #1, Dr Subhash Chandra *2 N Praveen Kumar Reddy, pursuing M.Tech from Holy Mary Institute of Technology and Science,,
More informationDESIGNING SECURE SENSOR NETWORKS
WIRELESS SENSOR NETWORKS DESIGNING SECURE SENSOR NETWORKS ELAINE SHI AND ADRIAN PERRIG, CARNEGIE MELLON UNIVERSITY Sensor networks are a promising approach for a variety of applications, such as monitoring
More informationVampire Attack Detecting and Preventing in Wireless Sensor Network
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 4, July 2014, PP 306-310 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Vampire Attack Detecting and Preventing in
More informationAn Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings
Theoretical and Applied Informatics ISSN 896 5334 Vol.24 (202), no. 2 pp. 09 8 DOI: 0.2478/v079-02-0009-0 An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings
More informationSecure Communication in a Distributed System Using Identity Based Encryption
Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA tjstadin@us.ibm.com Abstract Distributed systems require the ability to communicate
More informationFinal Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
More informationSoftware Puzzle Counterstrike for Denial of Service Attack
Software Puzzle Counterstrike for Denial of Service Attack Deepu. S. D, Dr. Ramakrishna. M.V 4th Sem M.Tech Student, Department of ISE, SJBIT, Bangalore, India Professor, Department of ISE, SJBIT, Bangalore,
More informationMASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
More informationJFK - Modeling & Network Denial of Service
Modelling Denial of Service Attacks on JFK with Meadows s Cost-Based Framework J. Smith J. M. González-Nieto C. Boyd Information Security Institute, Queensland University of Technology, Brisbane, Australia
More informationMulticast Authentication Based on Batch Signature (MABS) in Network Security
Multicast Authentication Based on Batch Signature (MABS) in Network Security Srikanth Bethu 1,,AsrarAhmedM.D. 2, Jesurun Prem Kumar Dasari 3, Soujanya S. 4 and Kanthi Kumar K. 5 1,4 Department of Computer
More informationNEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
More informationEfficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks
Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks Stefaan Seys and Bart Preneel K.U.Leuven, Department Electrical Engineering-ESAT, SCD/COSIC, Kasteelpark Arenberg 10,
More informationWireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
More informationGroup Key Establishment in Wireless Ad Hoc Networks
Group Key Establishment in Wireless Ad Hoc Networks Eric Ricardo Anton eric@gta.ufrj.br Otto Carlos Muniz Bandeira Duarte otto@gta.ufrj.br Grupo de Teleinformática e Automação COPPE/EE Programa de Engenharia
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More information1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies
1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?
More informationNetwork Security Course Specifications2011-2012
Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and
More informationEFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
More informationEFFECTIVE ALGORITHM FOR SECURITY AND INTEGRITY IN WIRELESS SENSOR NETWORKS
EFFECTIVE ALGORITHM FOR SECURITY AND INTEGRITY IN WIRELESS SENSOR NETWORKS Aayushi Assistant Professor Computer Science and Engineering M.M.E.C, Mullana Ambala Haryana, India Reeta Devi Assistant Professor
More informationA Flexible Approach to Embedded Network Multicast Authentication
A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University koopman@cmu.edu
More informationAn Efficient Secure Route Discovery Protocol for DSR
An Efficient Secure Route Discovery Protocol for DSR Kulasekaran A. Sivakumar and Mahalingam Ramkumar Department of Computer Science and Engineering Mississippi State University, MS. Abstract Ensuring
More informationEfficient Protocols for Signing Routing Messages
Efficient Protocols for Signing Routing Messages Kan Zhang Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG, UK Email kz200@cl.cam.ac.uk Abstract In this work, we aim to reduce
More informationDepartment of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus
Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems
More informationBatch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
Batch Decryption of ncrypted Short Messages and Its Application on Concurrent SSL Handshakes Yongdong Wu and Feng Bao System and Security Department Institute for Infocomm Research 21, Heng Mui Keng Terrace,
More informationAnalysis of Secure Cloud Data Sharing Within a Group
Analysis of Secure Cloud Data Sharing Within a Group Ms. uri Pande* Department of CSE, GHRAET Nagpur (M.S), India, Prof. Vikrant Chole Dept of Computer Science & Engg Nagpur (M.S.), India Abstract In this
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationSecurity protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti
Security protocols for ad-hoc wireless networks Raghava Karanam, Gautam Sreeram Pendum, Narendra Nath Vattikuti Project Introduction/Motivation With the emergence of the integrated circuits, the wireless
More informationComparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control
Comparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control Haodong Wang, Bo Sheng, Chiu C. Tan, Qun Li College of William and Mary Williamsburg,
More informationSECURITY SCHEMES FOR WIRELESS SENSOR NETWORKS WITH MOBILE SINK
SECURITY SCHEMES FOR WIRELESS SENSOR NETWORKS WITH MOBILE SINK A Dissertation by AMAR ADNAN RASHEED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements
More informationCommon Syllabus Revised 01.17.2015
Department of Applied Information Technology Volgenau School of Engineering IT 366 Information Security Fundamentals Common Syllabus Revised 01.17.2015 This syllabus contains information common to all
More information