NSF

Powered by NSF



(LEGO logo)

Bridging Security Primitives and Protocols: A Digital LEGO Set for Information Assurance Courses

[Overview]   [People]   [Publication]   [Presentation]   [Courses]   [Funding]  

Overview

This project tries to develop an innovative digital construction set that integrates the achievements in security education and visualization. Based on this integration, the PIs are designing a comprehensive suite of instructional demonstrations and hands-on experiments to assist students to bridge the security primitives and protocols. This approach applies the pedagogical methods learned from toy construction sets by treating security primitives as LEGO pieces and protocols as construction results. While the automatic demonstrations of protocol decomposition expose the relationship among the primitives and protocols, the hands-on experiments provide an effective training for students to apply primitives flexibly during protocol design. The modularized structure of the proposed approach also enables easy extensions by teachers and students.

The digital LEGO set, the comprehensive suite of demonstrations and experiments, and corresponding visualization tools will improve information assurance courses by:

  • Helping students bridge the security primitives and protocols and improving their understanding of the course contents
  • Cultivating student skills to flexibly apply primitives to the design and evaluation of security protocols under various requirements
  • Providing a friendly and encouraging platform and a group of demonstration and experiment samples to assist instructors to prepare their course materials
  • Enabling instructors to easily share, expand, and modify their course materials

People

    Investigators

    • Aidong Lu, Associate Professor, CS Department, UNC Charlotte
    • Weichao Wang, Associate Professor, SIS Department, UNC Charlotte

    Graduate Students

    • Zhiwei Li, PhD Student
    • Rodney Owens, PhD Student, GAANN Fellowship Awardee
    • Lane Harrison, PhD Student, Department of Homeland Security Fellowship Awardee

    Undergraduate Students

    • Ver Cher, Undergraduate Student

Publication

    3D Digital Legos for Teaching Security Protocols, accepted to appear in IEEE Transactions on Learning Technologies (TLT), 2010. L. Yu, L. Harrison, A. Lu, Z. Li, and W. Wang. [PDF]
    Rethinking about Type-flaw Attacks, accepted to appear in IEEE Global Communications Conference (GLOBECOM 2010). Z. Li and W. Wang. [PDF]
    Using Deductive Knowledge to Improve Cryptographic Protocol Verification, in IEEE Military Communications Conference (MILCOM 2009), Boston, October 2009. Zhiwei Li and W. Wang. [PDF]
    A Digital Lego Set and Exercises for Teaching Security Protocols, in Proceedings of Colloquium for Information Systems Security Education (CISSE), pp 26-33, Dallas, June 2008. W. Wang, A. Lu, L. Yu, and Z. Li. [PDF]
    Interactive Storyboard for Overall Time-Varying Data Visualization, in IEEE Pacific Visualization Symposium, 2008. Aidong Lu, Han-Wei Shen. [PDF]

Presentation

    A digital Lego set for cryptographic protocol education and exercises, presented on ACM SIGCSE Student Research Competition, March 2009.
    A digital Lego set for information assurance courses, presented at Richard Tapia Celebration of Diversity in Computing Conference, April 2009.
    A Digital Lego Set and Exercises for Teaching Security Protocols, presented at Colloquium for Information Systems Security Education (CISSE), Dallas, June 2008.

Related Courses

  • ITCS 6010/8010: Illustrative Visualization, Spring 2007.
  • ITCS 6140/8140: Data Visualization, Fall 2006.
  • ITIS 3200: Introduction to Information Security and Privacy, Fall 2007, Fall 2008, Spring 2009, Fall 2009, and Spring 2010.
  • ITIS 6010/8010: Wireless Network Security, Spring 2008.

Funding

This project is funded by the NSF Transforming Undergraduate Education in Science, Technology, Engineering and Mathematics (TUES) Program, (formerly Course, Curriculum, and Laboratory Improvement (CCLI) Program). The investigators are Aidong Lu and Weichao Wang at UNC Charlotte.



Last updated in August, 2012.