ITIS 6010/8010: Wireless Network Security

With the wide adoption of wireless networks, security becomes a key factor. Because of the signal propagation characteristics, limited bandwidth, weak processing capability, and various other reasons, enforcing security in wireless networks is more challenging.

This course will introduce the state-of-art techniques in wireless security. The topics include: Secure and resilient data aggregation, Key pre-distribution and management, Security in group communication, Trust establishment and management, Denial-of-service attacks, Secure routing, Secure localization and information privacy, and more.

The course will be beyond the "teach-listen" form. The students will form small groups and conduct some creative research in a specific area in wireless security. The course materials will be self contained.

Syllabus

Introduction

Routing for ad hoc networks: Part 1     Part 2    

Secure routing for MANET:   Part 1     Part 2

Key establishment in sensor networks:   Part 1     Part 2     Figure   Part 3    

Software based attestation:   Part 1     Part 2     Part 3    

Secure localization:   Part 1     Part 2    

Sybil attacks:   Part 1,     Part 2,     Part 3,     Part 4  

Term paper: Requirement,     Suggested topics and references

Self-healing approaches: Key management,     OS healing

Security of Android: intro,     inter app communication,     certification,     TaintDroid,     OS Fingerprint,

Jamming and DoS attack:     DeeJam,     Exception,     Feasible and Defense

Final exam: Exam,     Papers