Network security and privacy



Similar documents
CS 464/564 Networked Systems Security SYLLABUS

Bachelor of Information Technology (Network Security)

Mobile and Sensor Systems

A Study on the Security of RFID with Enhancing Privacy Protection

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Graduation Project Ideas Proposed By Faculty Members Department of Communication and Networks

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

RFID Security: Threats, solutions and open challenges

Security Levels for Web Authentication using Mobile Phones

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2

Security Challenges for User-Oriented RFID Applications within the Internet of Things

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Wireless Sensor Network: Challenges, Issues and Research

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

BCMB 496: BIOCHEMISTRY/MOLECULAR BIOLOGY SENIOR RESEARCH

Problems of Security in Ad Hoc Sensor Network

Fundamentals of Network Security - Theory and Practice-

Strengthen RFID Tags Security Using New Data Structure

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Network Security Administrator

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Security in Near Field Communication (NFC)

A Secure Intrusion Avoidance System Using Hybrid Cryptography

Alcatel-Lucent Technology Training

Spring 2013 CS 6930 Advanced Topics in Web Security and Privacy - 3 Credit Hours Syllabus and Course Policies

Introduction Chapter 1. Uses of Computer Networks

IT Networking and Security

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

ITL BULLETIN FOR AUGUST 2012

Security issues in Voice over IP: A Review

Security for Ad Hoc Networks. Hang Zhao

Trust and Reputation Management in Distributed Systems

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Curran, K. Tutorials. Independent study (including assessment) N/A

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

RFID Design Principles

DEGREE PROGRAMME IN INFORMATION TECHNOLOGY

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

CSE 5392 Sensor Network Security

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

PS Telematik Projekt: Embedded Sensor Web

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Various Attacks and their Countermeasure on all Layers of RFID System

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

CHAPTER 7. Wireless Technologies and the Modern Organization

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

RFID Guardian Back-end Security Protocol

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

FortiWeb 5.0, Web Application Firewall Course #251

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Wireless Network Security Spring 2015

Mobile Office Security Requirements for the Mobile Office

CS 5480 Computer Networks

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

Wireless Network Security

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

APPLIED AND INTEGRATED SECURITY

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

NETWORK SECURITY: CURRENT STATUS AND FUTURE DIRECTIONS

About the Authors Preface Acknowledgements List of Acronyms

CISS 492 DEA Senior Seminar in Management Information Systems

Vulnerability Analysis on Mobile VoIP Supplementary Services and MITM Attack

CSci 530 Midterm Exam. Fall 2012

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

CISS 280 B Systems Analysis & Design I

Vocera Communications: HIPAA Data Security and Privacy Standards for Voice Communications Over a Wireless LAN

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Embedded Internet and the Internet of Things WS 12/13

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Security Analysis on Wireless LAN protocols

CIT 217 Security + Network Security Fall 2015

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements

THE ANALYSIS AND SIMULATION OF VOIP

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

CS 203 / NetSys 240. Network Security

Wireless Local Area Network Deployment and Security Practices

CISS 492 A Senior Seminar in Management Information Systems

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Internet of Things: Architecture and Security

Transcription:

Summer semester 2013 Seminar on Network security and privacy (selected topics) Prof. Dr. Dieter Hogrefe Sviatoslav Edelev Maimun Rizal Hang Zhang 19.04.2013 1

Course Overview Prerequisites (Recommended): Mobile communication I Mobile communication II Implements Module: M.inf.122 - Seminar Telematik I M.Inf. 222 - Seminar Telematik II M.Inf. 1122: Seminar Vertiefung Telematik (AI) 3.06 - Advanced Topics in Computer Networking I (ITIS) Language English 2

Course Objectives Primary objectives: Learn some fundamentals of security and privacy issues in computer and wireless networks. Form the state of art on a certain topic. Provide a paper form report and a professional presentation for a chosen topic. Secondary objectives: Experience in preparing professional reports and presentations. Learn how to search for papers: IEEExplore, ACM, Citeseerx, whitepapers. 3

Hints on Reading papers Start QUICK SCAN Title, Abstract, Subtitles, Figures, Conclusion, Is the paper interesting? No Yes Thorough Reading Read carefully paper, discuss, analyze results. Summarize paper contributions, possible enhancements? End 4

Report Requirements: In form of IEEE conference template paper [two columns, 5-8 pages]: http://www.ieee.org/conferences_events/conferences/publi shing/templates.html Organization: Abstract, Introduction (Related work) Main part of your topic (model, discussion, analysis, simulations, results...) Conclusion PDF + Editable(Latex, word...) format 5

Hints on Writing Scientific Papers Abstract: not more than 100-150 words. Brief Introduction*: Introduce problem (why important, motivate) (Related work). Outline your contribution. Outline paper structure.(this paper is organized as follows...) Body*: Problem, system model/architecture, basics... Discussion, anaylsis. Evaluation, results. Summary and conclusions. Bibliography. *These points might vary with the subject topic. *Source:http://www.cs.columbia.edu/~hgs/etc/writing-style.html 6

Hints on Writing Scientific Papers Paragraphs should have a logical narrow flow. Avoid very long sentences. Clarify notations at first use. Write for the reader, not yourself. Not only show figures! Comment, Analyze and Abstract! Avoid spelling mistakes!!! Review several times! 7

Presentation High-quality presentation Well-structured, correct spelling, professional layout. Duration of each presentation ~30 minutes + ~15 minutes discussion. Slides presentation (e.g. Pdf, ppt, ) Compliance with set deadlines. 8

Hints for the Presentation Rule of thumb: A slide containing a normal content takes about 1-2 minutes for 30 minutes approximately 20-26 slides. Basic guide Welcome your audience. Give an outline of the presentation. Try to speak without notes, do not read out loud everything from the slides word-by-word. Adjust your presentation speed so that the audience can follow. How to give a good research talk guide: http://research.microsoft.com/en-us/um/people/simonpj/papers/givinga-talk/giving-a-talk.htm http://www.ted.com/talks/nancy_duarte_the_secret_structure_of_great _talks.html 9

Security & Privacy Fundamentals Integrity User (Who?) Availability Security Confidentiality Confidentiality (What?) Privacy Location (Where) Nonrepudiation Authentication Activity (How?) 10

Applications Internet WSN MANETs VNETs WBANs VoIP Wireless Localization Routing Protocols Wireless Sensor Networks Mobile Ad hoc Networks Vehicular Networks Wireless Body Area Networks Healthcare Voice over IP PKE GPS 11

Selected Topics 1. Survey on Distance Measurement Approaches within Bluetooth Area 2. Overview of RFID: strong and weak points, privacy and security issues, applications, open questions. Data encoding on RFID-tags. 3. DOS Attacks against IEEE 802.11 4. Intrusion-Detection Systems in Wireless Networks 5. Vulnerability Analyses and Attacks on NFC Enabled Cell Phones 6. Privacy and security issues in RFID authentication protocols 7. RFID Malware 8. Anonymity in communication systems 9. Man-in-the-Middle Attacks on VoIP 10. Authentication in Voice over Internet Protocol (VoIP) 11. Attacks of Trust and Reputation Systems 12. Key Management in Ad-hoc Networks 12

Available Topics 1. Survey on Distance Measurement Approaches within Bluetooth Area 2. Overview of RFID: strong and weak points, privacy and security issues, applications, open questions. Data encoding on RFID-tags. 3. DOS Attacks against IEEE 802.11 4. Intrusion-Detection Systems in Wireless Networks 5. Vulnerability Analyses and Attacks on NFC Enabled Cell Phones 6. Privacy and security issues in RFID authentication protocols 7. RFID Malware 8. Anonymity in communication systems 9. Man-in-the-Middle Attacks on VoIP 10. Authentication in Voice over Internet Protocol (VoIP) 11. Attacks of Trust and Reputation Systems 12. Key Management in Ad-hoc Networks 13

References C. Mulliner, ''Vulnerability Analysis and Attacks on NFC-enabled Mobile Phones '', In Proc. of International Conference on Availability, Reliability and Security, 16-19 March 2009 L. Wang, B. Srinivasan and N. Bhattacharjee, ''Security Analysis and Improvements on WLANs'', Journal of Networks, VOL. 6, NO. 3, March 2011 K. Finkenzeller, ''RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication'', 3rd Edition, ISBN: 978-0- 470-69506-7, June 2010 A.N. Raghavan, H. Ananthapadmanaban, M.S. Sivamurugan, B. Ravindran, ''Accurate Mobile Robot Localization in indoor environments using Bluetooth'', In Proc. of 2010 IEEE International Conference on Robotics and Automation, May 3-8, 2010, Anchorage, USA H. Debar, ''An Introduction to Intrusion-Detection Systems'', In Proceedings of Connect, 2000 Marmol F G, Pérez G M. ''Security threats scenarios in trust and reputation models for distributed systems''[j]. Computers & Security, 2009, 28(7): 545-556. Hegland A M, Winjum E, Mjolsnes S F, et al. ''A survey of key management in ad hoc networks''[j]. IEEE Communications Surveys & Tutorials, 2006, 8(3): 48-66. 14

References A. Juels, ''RFID security and privacy: a research survey'', IEEE Journal on Selected Areas in Communications, Volume 24, Issue 2, Pages: 381-394, Feb. 2006 M.R. Riebacka, P.N.D. Simpsona, B. Crispoa, A.S. Tanenbaum, ''RFID malware: Design principles and examples'', Journal on Pervasive and Mobile Computing, Volume 2, Issue 4, Pages 405-426, November 2006 Danezis, G., et al. (2009). ''Systems for anonymous communication.'' Handbook of Financial Cryptography and Security, Cryptography and Network Security Series: 341-389. Ren, J. and J. Wu (2010). ''Survey on anonymous communications in computer networks.'' Computer Communications 33(4): 420-431. R. Zhang, X. Wang, R. Farley, X. Jiang, ''On the Feasibility of Launching the Man-in-the-Middle Attacks on VoIP from remote Attackers'', ASLACCS09, March 10-12, 2009, Sydney, NSW, Australia. ACM 978-1-60558-394-5/09/03. F. Wang, Y. Zhang, ''A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography,'' Computer Communications, Volume 31, Issue 10, 25 June 2008, Pages 2142-2149, ISSN 0140-3664 15

Course Plan No. Course Description Date 1 Register for the seminar by sending an email to the leading assistant. Please register as soon as possible to arrange the necessary amount of topics. 15.04.2013 2 Introduction Session (PDF) 15.04.2013 3 Finalize your topic 22.04.2013 4 Discussion of a draft of the report 21-24.05.2013 5 Register in FlexNow!. Students from ITIS should register in their 24.05.2013 examination system 6 Submit the final report as PDF-file to the leading assistant. 10.06.2013 7 Recommended time for preparing the talk, discussion of the slides. 17.06.2013 8 Submit the slides. 20.06.2013 9 A week for discussion the slides with the leading assistant. 24-28.06.2013 10 Presentation of topics: tba, ca. 01-05.07.2013 11 Presentation of topics: tba 16

Grading points Report: 50% Presentation: 40% Active participation in seminar: 10%. Penalties may apply: Incompliance with set deadlines. Incomplete attendance of block seminar. 17

18