Powered by NSF
|
|
|
Bridging Security Primitives and Protocols: A Digital LEGO Set for
Information Assurance Courses |
[Overview]
[People]
[Publication]
[Presentation]
[Courses]
[Funding]
This project tries to develop an innovative digital construction
set that integrates the achievements in security education and
visualization. Based on this integration, the PIs are designing a
comprehensive suite of instructional demonstrations and hands-on
experiments to assist students to bridge the security primitives
and protocols. This approach applies the pedagogical methods learned
from toy construction sets by treating security primitives as LEGO
pieces and protocols as construction results. While the automatic
demonstrations of protocol decomposition expose the relationship among
the primitives and protocols, the hands-on experiments provide an
effective training for students to apply primitives flexibly during
protocol design. The modularized structure of the proposed approach
also enables easy extensions by teachers and students.
The digital LEGO set, the comprehensive suite of demonstrations
and experiments, and corresponding visualization tools will improve
information assurance courses by:
- Helping students bridge the security primitives and protocols
and improving their understanding of the course contents
- Cultivating student skills to flexibly apply primitives to the
design and evaluation of security protocols under various requirements
- Providing a friendly and encouraging platform and a group of demonstration
and experiment samples to assist instructors to prepare their course materials
- Enabling instructors to easily share, expand, and modify their course materials
Investigators
- Aidong Lu, Associate Professor,
CS Department, UNC Charlotte
- Weichao
Wang, Associate Professor, SIS Department, UNC Charlotte
Graduate Students
- Zhiwei Li, PhD Student
- Rodney Owens, PhD Student, GAANN Fellowship Awardee
- Lane Harrison, PhD Student, Department of Homeland Security Fellowship Awardee
Undergraduate Students
- Ver Cher, Undergraduate Student
3D Digital Legos for Teaching Security Protocols,
accepted to appear in IEEE Transactions on Learning Technologies (TLT),
2010. L. Yu, L. Harrison, A. Lu, Z. Li, and
W. Wang.
[PDF]
|
Rethinking about Type-flaw Attacks,
accepted to appear in IEEE Global Communications Conference
(GLOBECOM 2010).
Z. Li and W. Wang.
[PDF]
|
Using Deductive Knowledge to
Improve Cryptographic Protocol Verification,
in IEEE Military Communications Conference (MILCOM 2009), Boston, October 2009.
Zhiwei Li and W. Wang.
[PDF]
|
A Digital Lego Set and Exercises
for Teaching Security Protocols,
in Proceedings of
Colloquium for Information Systems Security Education (CISSE), pp 26-33, Dallas, June 2008.
W. Wang, A. Lu, L. Yu, and Z. Li.
[PDF] |
Interactive Storyboard for Overall Time-Varying Data Visualization,
in IEEE Pacific Visualization Symposium, 2008.
Aidong Lu, Han-Wei Shen.
[PDF]
|
A digital Lego set for cryptographic protocol education and exercises, presented on ACM SIGCSE
Student Research Competition, March 2009.
|
A digital Lego set for information assurance courses,
presented at Richard Tapia
Celebration of Diversity in Computing Conference, April 2009.
|
A Digital Lego Set and Exercises
for Teaching Security Protocols,
presented at Colloquium for Information Systems Security Education (CISSE), Dallas, June 2008.
|
Related Courses
- ITCS 6010/8010: Illustrative Visualization, Spring 2007.
- ITCS 6140/8140: Data Visualization, Fall 2006.
- ITIS 3200: Introduction to Information Security
and Privacy, Fall 2007, Fall 2008, Spring 2009,
Fall 2009, and Spring 2010.
- ITIS 6010/8010: Wireless Network
Security, Spring 2008.
This project is funded by the NSF
Transforming Undergraduate Education in Science, Technology, Engineering and Mathematics (TUES) Program,
(formerly Course, Curriculum, and Laboratory Improvement (CCLI) Program).
The investigators are Aidong Lu and Weichao Wang at UNC Charlotte.
|