CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

Spring 2008








Announcement:

April 4:

Project presentation requirement and what to turn in.

April 2:

Check sample Summaries listed below:

Feb 21:

There will be no class on 4/1/2008. Yes, do your project.

Jan 30:

Course mailing list changed into: CSCE790V-001@lists.cse.sc.edu

Jan 16:

Paper Biba has been removed!

Jan 15:

Classroom changed to 300 Main St. B112!!!!

Course mailing list: CSCE790-002 at lists.cse.sc.edu






Time: TTH 3:30PM - 4:45PM
Place: SWGN 2A18
Instructor: Dr. Wenyuan Xu  (wyxu cse.sc.edu)
Office Hours: TTH 5:00PM - 6:00PM or by appointment
Room: SWGN 3A54


Syllabus


Schedule

1: 1/15/2008

Course organization

Presentation grading form

 

2: 1/17/2008

  • Milestone: Chosen papers to present.  Form a team and start to choose project to work on.

3: 1/22/2008

  • Wireless Networks

 
4: 1/24/2008

 
5: 1/29/2008
 
6: 1/31/2008
 
7: 2/5/2008
 
8: 2/7/2008
 
9: 2/12/2008
 
10: 2/14/2008
  • Milestone: Written project proposals.
11: 2/19/2008
12: 2/21/2008
 
13: 2/26/2008 (travel)
  • Guest lecture: Chin-Tser Huang, "Authentication and Privacy in WiMAX Networks"

  • Sensor networks security

 
14: 2/28/2008
  • Milestone: Discuss project designs.

15: 3/4/2008

16: 3/6/2008
 
17: 3/11/2008
  • Spring break, no class.

 
18: 3/13/2008

  • Spring break, no class.

 
19: 3/18/2008

 

20: 3/20/2008
 
21: 3/25/2008
 
22: 3/27/2008
  
 
23: 4/1/2008 (travel)
Yeah, no class! Hold on, do your project!
 
24: 4/3/2008
25: 4/8/2008
26: 4/10/2008
27: 4/15/2008
 
28: 4/17/2008
  • Bluetooth Security

    • M. Jakobsson and S. Wetzel. "Security weaknesses in bluetooth". In Topics in Cryptology - CT-RSA 2001, volume 2020, pages 176 -191, San Francisco, April 2001. Springer.

    • Additional reading material

Theodoros Salonidis and Pravin Bhagwat and Leandros Tassiulas and Richard O. LaMaire, "Distributed Topology Construction of Bluetooth Personal Area Networks," In Proceedings of  IEEE Infocom, 2001

Cracking the Bluetooth PIN

29: 4/22/2008

  • Final project review

    • Jeffery Barton, Josh Van Buren, Dustin Christman, and Habib Moukalled, "Evil Twin Access Point"

    • Boris Kurktchiev, Paul Sagona, kimbrely Yonce, " A study of the Evil Twin Access Point"

    • Jason Moulton, and Matthew Sanderson, "Battlefield identification of Friendly Forces"

    • Yuliya Kopylova, "Detecting Rogue Access Points"

 
30: 4/24/2008
  • Final project review

    • Michael Kroll, Yi Xian, Ivanka Todorova, and Sharaf Malebary, "Implemeting 802.1x in Existing Cisco Environment proposal"

    • Vipul Gupta, Vyas, and Lu Guo Yu, "Proof of concept for the paper 'A solution to WLAN Authentication and Association DoS Attacks'"

    • Devon Callahan, Johnny Flowers, Hal Lindsey, and Ryan Yandle, "802.11'd de-authentication/disassociation attacks"