Graduation Project Ideas Proposed By Faculty Members Department of Communication and Networks



Similar documents
A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Designing a Windows Server 2008 Network Infrastructure

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Network System Design Lesson Objectives

Current and Future Research into Network Security Prof. Madjid Merabti

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

CompTIA Network+ (Exam N10-005)

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

Gigabit Content Security Router

Ranch Networks for Hosted Data Centers

Fundamentals of a Windows Server Infrastructure MOC 10967

Computer Network Engineering

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

Industrial Communication. Securing Industrial Wireless

Introduction Chapter 1. Uses of Computer Networks

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

Network Security Course Specifications

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Course Outline. ttttttt

Analysis of Mobile IP in Wireless LANs

Developing Network Security Strategies

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

NOS for Network Support (903)

A Security Architecture for. Wireless Sensor Networks Environmental

Computer Network Engineering

Secure SCTP against DoS Attacks in Wireless Internet

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Networking Basics for Automation Engineers

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Introduction to Wireless Sensor Network Security

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

Denial of Service Attacks

Networking Technology Online Course Outline

Internet of Things: Architecture and Security

For more information or call

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Gigabit Multi-Homing VPN Security Router

Security Design.

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Chapter 4: Networking and the Internet

Gigabit Multi-Homing VPN Security Router

Web Foundations Series Internet Business Associate

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

WAN Traffic Management with PowerLink Pro100

SBSCET, Firozpur (Punjab), India

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Network Technology CMP-354-TE. TECEP Test Description

Frequent Denial of Service Attacks

estadium Project Lab 8: Wireless Mesh Network Setup with DD WRT

Gigabit SSL VPN Security Router

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Designing scalable wireless networks in the campus LAN

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Demystifying Wireless for Real-World Measurement Applications

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Internet of Things based approach to Agriculture Monitoring

Security Issues In Cloud Computing and Countermeasures

Unit Objectives. IP Addressing Basics. Component 4: Introduction to Information and Computer Science. Unit 7: Networks & Networking Lecture 2

SANE: A Protection Architecture For Enterprise Networks

Open-Source Software Toolkit for Network Simulation and Modeling

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015

Wireless Sensor Network: Challenges, Issues and Research

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

IT 3202 Internet Working (New)

Chapter 3 LAN Configuration

6LoWPAN Technical Overview

Chapter 1 Personal Computer Hardware hours

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. January 11 CMSC417 Set 1 1

Internet of Things 2015/2016

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Curran, K. Tutorials. Independent study (including assessment) N/A

Understanding Security Testing

Wireless Technology Seminar

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia

Collaborative Professional Services

Testing Network Security Using OPNET

SCOPE DOCUMENT. Trade Name IT- Network Systems Administration Post- Secondary DATE OF DISTRIBUTION VIA WEBSITE

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Chapter 5. Data Communication And Internet Technology

Acquia Cloud Edge Protect Powered by CloudFlare

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

MANAGEMENT INFORMATION SYSTEMS 8/E

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Huawei One Net Campus Network Solution

Link Layer and Network Layer Security for Wireless Networks

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

RIOT CONTROL The Art of Managing Risk for Internet of Things

Transcription:

Graduation Project Ideas Proposed By Faculty Members Department of Communication and Networks Updated 7/12/2013

Faculty Member Proposed Project Title Research Interests Dr. Abdullah M. Almuhaideb Email: aalmuhaidob@kfu.edu.sa Ext:9215 or 8121 Dr.Tayseer AL-khdour Email: talkhdour@kfu.edu.sa Ext: 8116 Mr. Asad Tariq Email: atariq@kfu.edu.sa Ext: 9242 Mr. Ahmed Al Guqhiman Email: aalguqhaiman@kfu.edu.sa Dr. Mohammad Al Zahrani Email: malzahrani@kfu.edu.sa Prof. Muhammad M. Yasin Email: mmyasin@kfu.edu.sa Ext: 8128 Dr. Ishtiaq Chouhdry Email: ichoudhry@kfu.edu.sa Ext: 8131 Dr. Saqib Rasool Chaudhry Email: schaudhry@kfu.edu.sa Mr. Mohammad Alghawanem Email: Mmstghow@kfu.edu.sa Ext: 8148 Eng. Rahoof P P Email: rahoof@kfu.edu.sa Ext: 8136 1. Design and Implementation of a Mobile Authentication System to resist Denial of Service Attacks 2. Design a Selective Security Architecture and its implementation over SSL 3. Water flooding detection using RFID and WSN 4. Performance Evaluation of the KFU network using Opnet. Mobile Security & Performance Ubiquitous Computing Mobile Software Agent Wireless Sensor Networks. Wireless Networks. Optimization. 5. Patient Monitoring System with LTE, 4G Sensors Wireless Networks, Satellite & Broadcasting Networks. Network Automation Wireless Network Security. 6. IPv6 Networks Network Security Pen Testing IPv6 Networks Networking Applications Mobile Computing. Wireless Sensors Networks. Wireless Ad-Hoc Networks Network Security Computer Network Protocols. Network Security. Operating Systems and Embedded Systems. Wireless Sensor Networks. Network Performance Analysis. Network Security Network protocols Cloud Computing 1

Proposed By Design and Implementation of a Mobile Authentication System to resist Denial of Service Attacks Dr.Abdullah M. Almuhaideb In Denial of Service (DoS) attacks against roaming services, the adversary may flood a large number of illegal access request messages to network servers (both home network and foreign networks). The purpose is to exhaust their resources and render them less capable of serving legitimate users. Obviously, a practical authentication mechanism should maintain service availability despite of DoS attacks. Design an authentication protocol to address the Denial-of-service attacks issue in the mobile environment; Comparative analysis of existing design solutions; proof of concept by simulation using OPNET and by implementing the protocol. Tutoring/Help to Be Provided by the OPNET None Working with OPNET, Programming Tutorial will be provided about this specialized topic to the Group. 2

Proposed By Design selective security architecture and its implementation over SSL Dr.Abdullah M. Almuhaideb The inherent limitations of mobile devices (MD) increase the gap between security and performance, and this gap increases with the growing heterogeneity of computing environments. The aim of this project is to design a selective security architecture which can be integrated into security protocols to provide an efficient and secure mobile communication. The architecture makes use of both the information sensitivity and MD capabilities performance levels classifications in making a decision for suitable algorithm key length. As a possible application, the implementation will integrate the proposed architecture over SSL protocol to demonstrate the flexibility features that improves the protocol security performance. Applications are provided with an interface for selectively securing information at different levels of protection. Tutoring/Help to Be Provided by the OPNET None Working with OPNET, Programming Tutorial will be provided about this specialized topic to the Group. 3

Proposed By: Water flooding detection using RFID and WSN Dr.Tayseer AL-khdour Developing a system to detect water flooding and send an alarm when it is needed. The WSN network and RFID technology will be coupled to build the system. The students will use RFID tags, RFID readers, and wireless sensor motes to build a the system. the optimal deployment of the tags, and readers will be identified. Accordingly, the prototype system will be built physically. The programs that are needed to control the operation of the system will be developed. WSN and RFID system that detect water flooding and send alarm when needed will be built, the system will include hardware and software components. Tutoring/Help to be provided by the RFID tags RFID readers Wireless Sensor motes Programming Experience to deal with hardware components. 4

Proposed By: Performance Evaluation of the KFU network using Opnet. Dr.Tayseer AL-khdour The KFU network will be studied in details. The topology of the network, the components of it such as switches, bridges and links will be identified. Accordingly, an Opnet model will be built to simulate the KFU network. Performance evaluation of the model will be performed assuming different scenarios. Based on the results analysis, Recommendations to improve the KFU network will be proposed. An Opnet model that represents the KFU network will be built. Performance evaluation of KFU network assuming different scenarios will be performed. Opnet Simulation tool Programming Tutoring/Help to be provided by the 5

Proposed By: Patient Monitoring System with Sensors Mr. Asad Tariq We can work on the idea of monitoring of paralyzed and Comma patients and let hospital staff inform about it. We can put sensors on the patient s body to gather the data of patient s movement, temperature, blood pressure etc. which will useful for doctors to analyze the patient or tackle any emergency situation. Students will be able to apply real time applications to medical industry. IEEE Sensor Lab. Sensor Networks, Network Simulation. Tutoring/Help to be provided by the 6

Proposed By: IPv6 Networks Ahmed Al Guqhiman As IPv4 has been used for many years and the ISPs are running out of the IP addresses, new and current organizations will have to use the IPv6 networks. So, in this project students have to design and develop the IPv6 networks for medium organizations and deploy IPv6 networks for current organizations that have IPv4 running. Comparing the IPv4 and IPv6 networks Network infrastructure (WAN and LAN) Network services in IPv6 (email, DNS, etc) IPv6 addressing Routing protocols Security infrastructure Deployment and transition Developing IPv6 Networks, Criprian Popoviciu, Eric Levy-Abegnoli, Pattric Grossetete TCP/IP Protocol Suite, Behorouz A. Foruzan Internet Tutoring/Help to be provided by the Developing IPv6 Networks by Criprian Popoviciu, Eric Levy-Abegnoli, Pattric Grossetete Knowing what the IPv6 is and how it functions Knowing the TCP/IP very well How to secure networks 7