ITIS 6010/8010: Wireless Network Security
With the wide adoption of wireless networks, security becomes a key factor.
Because of the signal propagation characteristics, limited bandwidth,
weak processing capability, and various other reasons, enforcing
security in wireless networks is more challenging.
This course will introduce the state-of-art techniques in wireless
security. The topics include:
Secure and resilient data aggregation,
Key pre-distribution and management,
Security in group communication,
Trust establishment and management,
Denial-of-service attacks,
Secure routing,
Secure localization and information privacy,
and more.
The course will be beyond the "teach-listen" form. The
students will form small groups and conduct some creative research
in a specific area in wireless security.
The course materials will be self contained.
Syllabus
Introduction
Routing for ad hoc networks: Part 1    
Part 2    
Secure routing for MANET:   Part 1    
Part 2
Key establishment in sensor networks:   Part 1    
Part 2    
Figure  
Part 3    
Software based attestation:   Part 1    
Part 2    
Part 3    
Secure localization:   Part 1    
Part 2    
Sybil attacks:   Part 1,  
  Part 2,  
  Part 3,  
  Part 4  
Term paper: Requirement,  
  Suggested topics and references
Self-healing approaches: Key management,
    OS healing
Security of Android: intro,
    inter app communication,
    certification,
    TaintDroid,
    OS Fingerprint,
Jamming and DoS attack:
    DeeJam,
    Exception,
    Feasible and Defense
Final exam: Exam,    
Papers