Wireless Network Security Spring 2015



Similar documents
Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies

CSCD 330 Network Programming Winter Lecture 1 - Course Details

Applied Information Technology Department

University of Central Florida Department of Electrical Engineering & Computer Science EEL 4914C Spring Senior Design I

SYST 371 SYSTEMS ENGINEERING MANAGEMENT

Intro to Graduate Education and Technology ED 500 Spring, 2012 ONLINE Course Outline

Introduction to Computer Forensics Course Syllabus Spring 2012

IT 415 Information Visualization Spring Semester

Psychological Testing (PSYCH 149) Syllabus

The University of Texas at Tyler COLLEGE OF BUSINESS & TECHNOLOGY Fall Semester 2013 Course Syllabus. Introduction to the American Health Care System

Learn how to store and analyze Big Data Learn about the cloud and its services for Big Data

BAE 402: Biosystems Engineering Design I Biosystems and Agricultural Engineering College of Engineering Fall 2013

Accounting 327 Spring 2013 (IDs: Financial Statement Analysis Professor Office Hours Phone Course Time/Location T Th:

CSE598k / CSE545 Advanced Network Security

CIS 292 Computer and Network Security Proposed Start: Summer Instructor's Name: Office Location: Office Hours: Office Phone:

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015

Syllabus: Business Strategic Management

Subject & Course: CS362 Software Engineering II. Credits: 4. Instructor s Name: Arpit Christi. Instructor s christia@onid.oregonstate.

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

INF 203: Introduction to Network Systems (3 credit hours) Spring W1, Class number 9870

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

CSCI 4250/6250 Fall 2015 Computer and Network Security. Instructor: Prof. Roberto Perdisci

INSC 102 Technologies for Information Retrieval FALL 2014 SECTION 002 Delivered online via Asynchronous Distance Education (ADE)

COURSE SYLLABUS. Instructor Background: M.S. Computer Information Systems, Nova Southeastern University

Common Syllabus Revised

CS Ethical Hacking Spring 2016

MIS 4336 Networks and Data Communication. Spring 2016

Forensic Biology 3318 Syllabus

CS 306/491-3 Linux Programming Spring 2015

Cosc Microcomputer Applications Course Syllabus: Fall 2014

Lecture 1 - Overview

A. COURSE DESCRIPTION

Software Quality. Learning outcomes and evaluation: Students that successfully complete the course will be able to:

4ECE 320 Signals and Systems II Department of Electrical and Computer Engineering George Mason University Fall, 2015

California State University, Chico Department of Health & Community Services

MIS 310: Management Information Systems (Spring 2015)

MIS Information Systems for Management The University of Manitoba, I.H. Asper School of Business Department of Accounting and Finance

COMP252: Systems Administration and Networking Online SYLLABUS COURSE DESCRIPTION OBJECTIVES

Applied Network Security Course Syllabus Spring 2015

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Course Syllabus Revised: Dec. 20, 2011.

IT 101 Introduction to Information Technology

CS 425 Software Engineering

BADM 260 C Course Outline Introduction to Finance. Winter Randy Nicholls, CA MC Randy.nicholls@rdc.ab.ca

MARSHALL SCHOOL OF BUSINESS University of Southern California. FBE 555: Investment Analysis and Portfolio Management

University of Colorado Denver College of Engineering and Applied Science CVEN-5333 Surface Water Hydrology

Washington State University Health Sciences Pharmaceutical Sciences Graduate Program

San José State University CS160, Software Engineering, Sections 1, 2, and 4, Fall, 2015

CIS 240 Management Information Systems Proposed Start: Spring Instructor's Name: Office Location: Office Hours: Office Phone:

UNIVERSITY OF LETHBRIDGE FACULTY OF MANAGEMENT. Management Contemporary Database Applications (Using Access)

Course Outline. Fall Session 2015 A03

Brown University Department of Economics Spring 2015 ECON 1620-S01 Introduction to Econometrics Course Syllabus

Project Management Tools and Leadership (MIS3886) Spring 2016 Course Syllabus

CS 1361-D10: Computer Science I

CS 464/564 Networked Systems Security SYLLABUS

MARY BALDWIN COLLEGE HEALTH CARE ADMINISTRATION PROGRAM HCA 330: MANAGED CARE. Spring 2014-Blackboard Learn Online

INFO & 090 Business Data Communications and Information Security Fall 2014

MATH 205 STATISTICAL METHODS

College of Southern Maryland Fundamentals of Accounting Practice(ACC 1015) Course Syllabus Spring 2015

IST659 Fall 2015 M003 Class Syllabus. Data Administration Concepts and Database Management

School of Kinesiology Faculty of Health Sciences Western University. KIN 2032b Research Design in Human Movement Science January to April 2016

MIS W: Mobile Business

Syllabus CIS 3630: Management Information Systems Spring 2009

Psychology 318, Thinking and Decision Making Course Syllabus, Spring 2015 TR 8-9:20 in Lago W262

Computer Science 3CN3 Computer Networks and Security. Software Engineering 4C03 Computer Networks and Computer Security. Winter 2008 Course Outline

CST 244 Computer Forensics and Investigation Spring, 2010

EE411: Introduction to VLSI Design Course Syllabus

CS 450/650 Fundamentals of Integrated Computer Security

MIS W: Mobile Business

BUS Computer Concepts and Applications for Business Fall 2012

INFO 2130 Introduction to Business Computing Fall 2014

Online Basic Statistics

Securing Applications, Web Services, and Software-As-A-Service (SAAS)

Technology and Online Computer Access Requirements: Lake-Sumter State College Course Syllabus

Belk College of Business Administration, University of North Carolina at Charlotte. INFO : MANAGEMENT INFORMATION SYSTEMS Spring 2012

CIS 3515 Mobile Application Development Instructor:

MUSIC BUSINESS Northwest College MUSB COOPERATIVE EDUCATION, MUSIC MANAGEMENT AND MERCHANDISING. CRN Summer 2014

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Introduction to Information Technology ITP 101x (4 Units)

INFO 2130 Introduction to Business Computing Spring 2013 Self-Paced Section 006

AGEC 448 AGEC 601 AGRICULTURAL COMMODITY FUTURES COMMODITY FUTURES & OPTIONS MARKETS SYLLABUS SPRING 2014 SCHEDULE

Division of Fine Arts Department of Photography Course Syllabus

OPERATIONS, BUSINESS ANALYTICS & INFORMATION SYSTEMS

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

CIT 217 Security + Network Security Fall 2015

FACULTY OF MANAGEMENT FUNDAMENTALS OF INVESTMENTS MGT 3412 Y - FALL 2015

THE UNIVERSITY OF TEXAS AT TYLER COLLEGE OF BUSINESS & TECHNOLOGY DECISION MAKING IN OPERATIONS MANAGEMENT COURSE SYLLABUS FALL 2010

ISM and 05D, Online Class Business Processes and Information Technology SYLLABUS Fall 2015

HTA 435: Hospitality Marketing Management Spring 2011 Tuesday 2-3: Quigley Hall

UNIVERSITY OF MASSACHUSETTS BOSTON COLLEGE OF MANAGEMENT AF Theory of Finance SYLLABUS Spring 2013

Network Security Course Specifications

CS 649 Database Management Systems. Fall 2011

BA 561: Database Design and Applications Acct 565: Advanced Accounting Information Systems Syllabus Spring 2015

Lake-Sumter State College Course Syllabus. CRN: Credit: 2 Term: Spring Contact Information: Office Hours:

MGT 3361 Project Management

IS Management Information Systems

Personality Psychology (PSYC 330) Summer 2015

CS 425 Software Engineering. Course Syllabus

EDMS 769L: Statistical Analysis of Longitudinal Data 1809 PAC, Th 4:15-7:00pm 2009 Spring Semester

Required Text Schacter, Daniel L. Introducing Psychology with Updates on DSM-5 (2nd ed.). Worth Publishers. (2014).

Transcription:

Wireless Network Security Spring 2015 Patrick Tague Class #1 Course Introduction & Logistics 2015 Patrick Tague 1

Class #1 Brief overview of the course Logistics Course information Talk about projects (if there's time) 2015 Patrick Tague 2

What is this course all about? 2015 Patrick Tague 3

What is Security? A system is secure with respect to a certain property if one can guarantee that property with a reasonably high probability 2015 Patrick Tague 4

What is Wireless Network Security? A probabilistic guarantee Authenticity that a wireless network does its job as expected,? Secrecy even when faced with a variety of threats 2015 Patrick Tague 5

Focus on the Networks In the Wireless Network Security course, we'll study: Different network systems Underlying technologies Applications, systems, services, relying on them Threats, security issues, privacy concerns, etc. 2015 Patrick Tague 6

Wireless Networks Enterprise Wireless Telecommunications Wireless Internet Ad Hoc / Mesh Vehicular Networks Sensing / Control Systems 2015 Patrick Tague 7

Fundamental Challenges Wireless is open / shared User/device/system verification is more difficult System resource availability often cannot be guaranteed Wireless batteries resource constraints Security costs $$$, time, energy, CPU cycles, bandwidth, scalability, etc. 2015 Patrick Tague 8

Practical Challenges Wireless network protocols were designed around wired protocols Higher layers were originally the same, until people realized it didn't work well Security mechanisms were (unfortunately) treated quite similarly Layered model doesn't translate well for all desired security properties e.g. How to provide performance guarantees with only best-effort services? 2015 Patrick Tague 9

Practical Challenges Not all wireless systems follow Internet-style (client-server) models Ad hoc networks, sensor/actuator networks, fog We must change the way we think about security! There are a lot of trade-offs between security, efficiency, performance, scalability,... 2015 Patrick Tague 10

Practical Challenges Each different network type, context, etc. has different properties, features, goals,... Protocols designed for WiFi Internet access probably shouldn't be used for safety-critical systems in cars... Best-effort data delivery probably isn't sufficient for handling distributed control system inputs... 2015 Patrick Tague 11

Diverse Wireless Systems Each of these types of wireless networks has different structure, function, and purpose As such, we expect each to have different functional and security requirements 2015 Patrick Tague 12

Course Objectives Understanding various security and privacy issues across different types of wireless systems Coverage includes both classical and next-generation wireless systems WiFi networks Mobile/telecom networks Ad hoc & mesh networks Distributed sensing and control systems 2015 Patrick Tague 13

Course Roadmap Application I) Layer-by-layer study of general wireless threats, issues, protections, etc. II) Application-centric ( vertical ) study of security and privacy issues Transport Network Link Physical 2015 Patrick Tague 14

Goals of the Course Understand the inherent vulnerabilities of wireless networking Know what to consider in designing wireless systems, services, and applications Hands-on experience in vulnerability analysis and secure system/service/protocol design Research experience w/ publishable results 2015 Patrick Tague 15

Questions about Content? Any questions about content, focus, etc. before I start talking logistics...? 2015 Patrick Tague 16

Logistics 2015 Patrick Tague 17

Course Website http://wnss.sv.cmu.edu/courses/14814/s15/ also a Blackboard page 2015 Patrick Tague 18

Prerequisites v. Assumptions While this course has no official prereqs, we make several assumptions about you You have taken a graduate-level Information Security course (e.g., 14-741, 18-631, 18-730) You have taken a graduate-level Networking course (e.g., 14-740, 18-756, 15-641) You are a decent programmer (esp. C/C++) and can pick up new programming skills easily We will not explicitly teach you these things, so some additional work may be needed if you don't match our assumptions 2015 Patrick Tague 19

Registration This course has 4 concurrent sections It's important that you register for the right one If your home dept is: ECE Not ECE If your location is: Pgh SV 18637 A 18637 SV 14814 A 14814 SV 2015 Patrick Tague 20

Waitlists If you're currently registered for this class, but not planning to stay: please drop If you're currently on the waitlist: 1) Make sure you're on the correct waitlist (see the previous slide) 2) Send me an email (tague@cmu.edu) detailing: 1) What year/term of your program are you in (priority will go to students closer to graduation)? 2) What degree requirements does this course fulfill? 3) Why you want to take this course? 4) What prereqs/qualifications do you have? 2015 Patrick Tague 21

Deliverables & Grading Individual work 30% Four assignments Late submission: 10%/day penalty, up to 2 days Group project Four presentations (intro, statement of work, progress update, final) 25% Graded individually, everyone must participate Two written reports (SoW, final paper) 25% No late submissions accepted Exam 20% 2015 Patrick Tague 22

Individual Assignments Four assignments Simulation/experimentation/programming component Research/survey component Assignments will use OMNET++ network simulator and some additional tools You're not expected to know anything about OMNET++ yet, but C++ and some scripting will be necessary Assignment details and deadlines will be online Individual each student does her/his own work Discussion is encouraged, but work is individual 2015 Patrick Tague 23

Project details: Teams of 3-4 students Group Project Option to work on sponsored project or come up with your own project First presentation on project background and topic proposal will be in early February, so form teams and get started soon Statement of Work due and presentation on Feb 26 Progress report in early April Final presentation in late April Final report due May 7 2015 Patrick Tague 24

What topic should I choose? 2015 Patrick Tague 25

Projects must: Project Topics Relate to systems covered in class and focus on some aspect of wireless network security Strive for new research/development contributions plan to submit a conference paper, poster, or demo Not be a project you're working on for your research or another course (no double-dipping) Examples of past projects: Attacks against location privacy in WiFi systems Attack-resilient multi-path routing in MANETs Localization in the presence of jammers Detection of spoofing in VANETs Secure dynamic address management in VANETs 2015 Patrick Tague 26

How should I form a project team? 2015 Patrick Tague 27

Project Teams Forming teams and choosing topics: These two things are not independent Try to choose team members with common interests, different backgrounds, etc., not just your friends Multiple teams cannot work on the same project 2015 Patrick Tague 28

More Project Details Each project will have an advisor/mentor Any faculty member, researcher, or suitable PhD student can sponsor a project let me know if you want to arrange an external project sponsor Project output will include a paper, poster, and demo Aim for conference-quality results Some hardware may be available, if needed 2015 Patrick Tague 29

Individual in-class exam Exam Closed-* exam, conceptual questions About ¾ through semester, tentatively April 7 2015 Patrick Tague 30

Important Dates All important dates are on the course schedule: http://wnss.sv.cmu.edu/courses/14814/s15/schedule.php 2015 Patrick Tague 31

Instructor: Patrick Tague Email: tague@cmu.edu Office: B23 218 Phone: 650-335-2827 Skype: ptague Contact Office hours: Tues 1-3pm Pacific Time via Skype only, other times by appointment Public Google calendar: http://goo.gl/fivbrk For an appointment, find an open time on my calendar and send an email to request a meeting (specify in person, Skype, etc.) 2015 Patrick Tague 32

Some Syllabus-type Details Class meetings: Tues/Thurs 10:30-11:50am PST / 1:30-2:50pm EST B23 212 @ SV campus, CIC 1201 @ Pgh campus Class website Schedule, slides, assignments, papers, projects, Submissions are via Blackboard Textbooks None, but some references are on the website Assigned reading Papers, blog posts, media, etc. 2015 Patrick Tague 33

Assigned Reading Between class readings, homework assignments, and project, you'll be reading a lot of papers! Don't be surprised to see 100+ pages of reading/week Reading research papers is not like reading textbooks, they're much more forgiving and can be read efficiently Hint: read the pamphlet posted for reading material today Seriously, print it out and read it...several times. A few minutes now could save many hours later. 2015 Patrick Tague 34

Important Policies Academic Integrity: all students are expected to adhere to academic integrity policies set forth by CMU, CIT, ECE, INI, etc. See https://www.ece.cmu.edu/programs-admissions/masters/academic-integrity.html http://www.ini.cmu.edu/current_students/handbook/index.html http://engineering.cmu.edu/current_students/graduates/policies.html http://www.cmu.edu/policies/documents/academic%20integrity.htm My Collaboration Policy: discussion is encouraged, but assignments must be done individually Copying in any form constitutes cheating, ask if it's unclear Plagiarism: no copying, attribute all content sources My Wikipedia Policy: if you cite Wikipedia (or similar) pages directly, you will fail the assignment/deliverable Re-grading: on a case-by-case basis, contact me 2015 Patrick Tague 35

Ethics of S&P Work Research, development, and experimentation with sensitive information, attack protocols, misbehavior, etc. should be performed with the utmost care You are expected to follow a strict ethical code, especially when dealing with potentially sensitive information If anything is unclear, ask before going forward 2015 Patrick Tague 36

Questions about Logistics? Any questions about course logistics? Feel free to email later. 2015 Patrick Tague 37

Assignment #1 First assignment has been posted online Please get started as soon as possible, it's due in 2 weeks This assignment mainly attempts to get you comfortable with OMNET++ programming and simulations We'll do a small tutorial next week to help, but try to get started on your own OMNET++ is available for most platforms If you're familiar with Linux, probably best to go that route If you're not good with Linux, Windows is a good option If you prefer OSX, it seems to work fine We reported some bugs last year that we believe were fixed 2015 Patrick Tague 38

January 15: Wireless Security Basics & Threat Models 2015 Patrick Tague 39