CSE 5392 Sensor Network Security



Similar documents
CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSC 474 Information Systems Security

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Cryptography and Network Security

Content Teaching Academy at James Madison University

SE 4472a / ECE 9064a: Information Security

CSCI 4541/6541: NETWORK SECURITY

CPSC 467: Cryptography and Computer Security

Computer and Network Security

F21CN: Computer Network Security: Overview

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

Network Security. Instructor: Adam Hahn

Introduction to Security

An Introduction to Digital Signature Schemes

CS 450/650 Fundamentals of Integrated Computer Security

Cryptography and Network Security Chapter 1

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

MGT 5309 FALL 07 LOGISTICS AND SUPPLY CHAIN MANAGEMENT SYLLABUS

Cryptography and Network Security: Overview

Information, Network & Cyber Security

HASH CODE BASED SECURITY IN CLOUD COMPUTING

Chap. 1: Introduction

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Table: Security Services (X.800)

Lesson 4: Introduction to network security

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

ICOM 5018 Network Security and Cryptography

Welcome to Information Systems Security (503009)

Cryptography and Key Management Basics

Information Security Basic Concepts

Information Security

CS 464/564 Networked Systems Security SYLLABUS

Introduction to Information Security

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

CS 758: Cryptography / Network Security

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Computer and Network Security

Microsoft STRIDE (six) threat categories

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

CS 203 / NetSys 240. Network Security

A Framework for Secure and Verifiable Logging in Public Communication Networks

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

CSE343/443 Lehigh University Fall Course Overview. Presenter: Yinzhi Cao Lehigh University

A SOFTWARE COMPARISON OF RSA AND ECC

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Information Security Course Specifications

Lecture II : Communication Security Services

Compter Networks Chapter 9: Network Security

Common Syllabus Revised

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Course Title: Mobile Cloud Computing Date: 8/18/2014. Suggested Bulletin Course Description. Instructor and Office Hours. Course Description

Chapter 6 Electronic Mail Security

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Computer and Network Security. Alberto Marchetti Spaccamela

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Weighted Total Mark. Weighted Exam Mark

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Principles of Entrepreneurship

The University Of Texas At Austin. The McCombs School of Business

Introduction to Computer Security

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

What is Web Security? Motivation

CIT 217 Security + Network Security Fall 2015

CRIPT - Cryptography and Network Security

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Boston University MET CS 690. Network Security

Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report

Network Security. A Quick Overview. Joshua Hill josh-web@untruth.org

Accounting : Accounting Information Systems and Controls. Fall 2015 COLLEGE OF BUSINESS AND INNOVATION

Data Privacy and Biomedicine Syllabus - Page 1 of 6

CIS 250 NETWORK SECURITY JACKSON STATE COMMUNITY COLLEGE COURSE SYLLABUS

Security Sensor Network. Biswajit panja

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Legalesign Service Definition Electronic signature and contract management service

Computer and Information Security

Module 7 Security CS655! 7-1!

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Transcription:

About Instructor CSE 5392 Sensor Network Security Course Introduction Dr. Donggang Liu, assistant professor, CSE department http://ranger.uta.edu/~dliu dliu@cse.uta.edu Tel: (817) 272-0741 Office: 330NH Office hours: Tuesday&Thursday 5:00PM-6:00PM CSE 5392 By Dr. Donggang Liu 1 CSE 5392 By Dr. Donggang Liu 2 About TA TBD Office hours: TBD Course Objectives Understanding of fundamental concepts, principles, and mechanisms in sensor network security Prepare students for graduate research in sensor network security Advanced topics: key management, security services, etc Recently published research papers CSE 5392 By Dr. Donggang Liu 3 CSE 5392 By Dr. Donggang Liu 4 Course Outcomes Basic Explain known security problems in sensor networks Explain how security mechanisms work for sensor networks Distinguish difference between security problems in sensor networks and those in wired networks. Advanced Identify and analyze new security problems in sensor networks Develop mechanisms to solve security problems in sensor networks. Design simulations to evaluate and analyze the performance of algorithms in sensor networks CSE 5392 By Dr. Donggang Liu 5 Course Style By instructor Sensor network basics Cryptography and security basics Sensor network security By students Read research papers on sensor network security Write reviews Give in-class presentations (15~20 minutes) CSE 5392 By Dr. Donggang Liu 6 1

Prerequisites Required Computer network Operating system Necessary for great success Technical writing skills Hardworking Textbooks and Papers No textbooks Reference books Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone (http://www.cacr.math.uwaterloo.ca/hac/) Cryptography and Network Security: Principles and Practice by William Stallings. Practical Cryptography by Niels Ferguson, Bruce Schneier Papers and Slides Links in the course syllabus CSE 5392 By Dr. Donggang Liu 7 CSE 5392 By Dr. Donggang Liu 8 Projects Group 2~3 students Working alone must be justified Roles can be negotiated inside the group Topics Should be relevant to the class Each group can come up with one The instructor can also give topics (check website) Projects (Cont d) Survey paper Surveys a particular field on sensor network security Summarizes the trend in this field A proposal (due on 6/10) and a final paper (due on 1/12) Research paper Identify original research problems A research paper with original technical contribution A proposal (due on 6/10) and a final paper (due on 1/12) Start thinking about your team and topic NOW CSE 5392 By Dr. Donggang Liu 9 CSE 5392 By Dr. Donggang Liu 10 On-line resource Course website http://ranger.uta.edu/~dliu/cse5392-sns.htm For course materials, e.g., papers, homework, project assignment. Check frequently for updates Grading Paper review 20% Participation 10% Project 40% Class presentation 30% + 10% extra CSE 5392 By Dr. Donggang Liu 11 CSE 5392 By Dr. Donggang Liu 12 2

Course Policies Assignment (paper review) and project deadlines will be firm. Late assignments will be accepted with a 10% reduction in grade for each day they are late by. All assignments must be turned in before the start of class on the due date Academic Integrity The university, college, and department policies against academic dishonesty will be strictly enforced. http://www.uta.edu/studentaffairs/judicialaffairs CSE 5392 By Dr. Donggang Liu 13 CSE 5392 By Dr. Donggang Liu 14 Course Topics Cryptography and security basics Sensor network basics Useful security tools One way hash chain Merkle hash tree Security in Sensor Networks Key management Broadcast authentication Secure localization Secure data aggregation Intrusion detection Privacy CSE 5392 By Dr. Donggang Liu 15 CSE 5392 Sensor Network Security Basic Security Concepts CSE 5392 By Dr. Donggang Liu 16 Cryptography and Security Cryptography Study of fundamental algorithms to protect data Encryption/decryption, hash, digital signature, etc. Security Study of protocols to protect a system Usually build upon cryptographic techniques Security Objectives Secrecy (Confidentiality) Integrity Availability (Denial of Service) CSE 5392 By Dr. Donggang Liu 17 CSE 5392 By Dr. Donggang Liu 18 3

Secrecy (Confidentiality) Prevent/detect/deter improper disclosure of information An employee should not come to know the salary of his manager The target coordinates of a missile should not be improperly disclosed Integrity Prevent/detect/deter improper modification of information An employee should not be able to modify the employee's own salary The target coordinates of a missile should not be improperly modified CSE 5392 By Dr. Donggang Liu 19 CSE 5392 By Dr. Donggang Liu 20 Availability (Denial of Service) Prevent/detect/deter improper denial of access to services provided by the system Paychecks should be printed on time as stipulated by law When the proper command is issued the missile should fire Other Security Objectives Non-repudiation Prevent an entity from denying the previous commitments or actions Securing computing resources: Prevent/detect/deter improper use of computing resources Hardware Resources Software resources Data resources Anonymity Prevent the disclosure of the identify of an entity to others CSE 5392 By Dr. Donggang Liu 21 CSE 5392 By Dr. Donggang Liu 22 Achieving Security Security policy What? Security mechanism How? Security assurance How well? Security Policy The set of rules that regulate how an organization manages, protects, and distributes sensitive information. Convert organization requirements to security policy that a computer system can understand Interact with human being Check and remove conflict rules CSE 5392 By Dr. Donggang Liu 23 CSE 5392 By Dr. Donggang Liu 24 4

Security Mechanism Prevention Access control Detection Auditing and intrusion detection Tolerance Practicality Good prevention and detection both require good authentication as as a foundation Security Mechanisms Security mechanisms implement functions that help prevent, detect, and respond to security attacks Prevention is more fundamental, but sometimes detection is the only option, e.g., Accountability inproper use of authorized privileges Security functions are typically made available to users as a set of security services through APIs or integrated interfaces Security services: confidentiality, authentication, integrity, non-repudiation, access control, monitor & response Cryptography underlies (almost) all security mechanisms CSE 5392 By Dr. Donggang Liu 25 CSE 5392 By Dr. Donggang Liu 26 Security Assurance How well your security mechanisms guarantee your security policy Everyone wants high assurance High assurance implies high cost May not be possible Trade-off is needed. CSE 5392 By Dr. Donggang Liu 27 5