CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.

Slides:



Advertisements
Similar presentations
Case Studies M.Sc. in Applied Statistics Dr. Órlaith Burke Michaelmas Term 2012.
Advertisements

CS 858 – Hot Topics in Computer and Communications Security Fall 2010 Introduction.
Welcome to the seminar course
Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Preparation for In-class Presentations.
Oral Presentation Advice on Talk Outline Converted to PPT a text document by Mark Hill, UW- Madison.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Welcome to CS 450 Internet Security: A Measurement-based Approach.
Introduction to SEG 5010 Hong Cheng 2009/10 Second Term.
Welcome to CS 395/495 Internet Measurement and its Reverse Engineering.
CSCE 211: Digital Logic Design
Experience in Applying Online Learning Techniques in Computer Science & Engineering Dr. Aiman H. El-Maleh Computer Engineering Department King Fahd University.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
Welcome to CS 395/495 Internet Architectures. What is this class about? (1) Goal: to help you understand what the future Internet will look like –What.
1 EEL 6935: Embedded Systems Seminar. 2 General Information Instructor: Ann Gordon-Ross Office: Benton Office Hours – By appointment.
Biology 475 Topics in Applied Microbiology. Biology 475 Official Course Description BIOL 475 LEC,SEM 0.50 Course ID: 1101 Topics in Applied Microbiology.
Exam Strategies for Essay Exams
28 August 2015T Kari Laitinen1 T Seminar on Wireless Future 3 ECTS cr Dr. Kari Laitinen Principal Lecturer Oulu University of Applied Sciences.
1 EEL 6935: Embedded Systems Seminar. 2 General Information Instructor: Ann Gordon-Ross Office: Benton Office Hours – By appointment.
WEEK-1 PRINCIPLES OF MANAGEMENT BUSN 107, Özge Can.
Fall 2004FSU CIS 5930 Internet Protocols1 Welcome to CIS 5930 Internet Protocols Time: 5:15PM-6:30PM, TTh Location: Love 301 Fall 2004, 3 credits.
Cornell Notes Note-taking strategy that will improve your study skills and your grades!!
Generic Conference Talk Outline. This conference talk outline is a starting point, not a rigid template. Most good speakers average two minutes per slide.
Generic Conference Talk: Intro Title/author/affiliation (1 slide) Forecast (1 slide) Give the gist of problem attacked and insight found (What is the one.
How to Give a Talk Stephen Gilbert June 30, 2015 Gilbert,
CSCI 51 Introduction to Computer Science Dr. Joshua Stough January 20, 2009.
Dana Nau: CMSC 722, AI Planning Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License:
Advanced Computer Networking Course Overview 1. This is a graduate-level course which covers advanced topics in computer networks including current hot.
Research and Writing Seminar Thursday, – 16 35, room C To find an up-to-date version of the schedule and to read the papers check the website
T Seminar on Network Security. Overview Paper finalization (deadline ) –Final check, images, references, style –Note the changed date of.
Introduction to Data Structures
1Thu D. NguyenCS 545: Distributed Systems CS 545: Distributed Systems Spring 2006 Department of Computer Science Rutgers University Thu D. Nguyen.
An Orientation: General Psychology Online. The Course Menu Shown on the far left is the menu used to navigate our Psychology course.
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
Jan 10, 2001CSCI {4,6}900: Ubiquitous Computing1 Administrative Chores Add yourself to the mailing
Internet Economics כלכלת האינטרנט Class 12 – Preparing for the second semester. 1.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
CM220: Unit 1 Seminar “You must be the change you wish to see in the world.” ~ Mohandas Gandhi.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Ian F. C. Smith Writing a Conference Paper. 2 Disclaimer This is mostly opinion. Suggestions are incomplete. There are other strategies.
Paper Title Author/affiliation/ address. Outline (0-1 slide) Motivation Background information/Related works Proposed Method Results Summary Future.
Ian F. C. Smith Writing a Journal Paper. 2 Disclaimer / Preamble This is mostly opinion. Suggestions are incomplete. There are other strategies. A good.
CS614: Advanced Course in Computer Systems (Spring’04) Instructor: Ken Birman TA: non assigned (yet)
CSCE 211: Digital Logic Design Chin-Tser Huang University of South Carolina.
CM220 College Composition II Friday, January 29, Unit 1: Introduction to Effective Academic and Professional Writing Unit 1 Lori Martindale, Instructor.
Welcome to Human Behavior and the Social Environment Dawn Burgess, Ed. D.
James Tam Introduction To CPSC 233 James Tam Java Object-Orientation Graphical-user interfaces.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Welcome to EECS 395/495 Online Advertising: A Systems Approach.
CSCE 990 Advanced Distributed Systems Seminar Ying Lu 104 Schorr Center
Oral Presentation Advice on Talk Outline Converted to PPT a text document by Mark Hill, UW- Madison.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Dana Nau: CMSC 722, AI Planning Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License:
Course Overview Stephen M. Thebaut, Ph.D. University of Florida Software Engineering.
Abstract  An abstract is a concise summary of a larger project (a thesis, research report, performance, service project, etc.) that concisely describes.
CSE6339 DATA MANAGEMENT AND ANALYSIS FOR COMPUTATIONAL JOURNALISM CSE6339, Spring 2012 Department of Computer Science and Engineering, University of Texas.
Welcome to EECS 395/495 IoT Networks Seminar
Welcome to EECS 395/495 Networking Problems in Cloud Computing
EEL 6686: Embedded Systems Seminar
Welcome to the Nevada Test Administration Training and Q&A Session
Aylin AKÇA OKAN METU, Ankara Fall
CSCE 211: Digital Logic Design
Research Live Presentation Template
CSCE 211: Digital Logic Design
PHYS 202 Intro Physics II Catalog description: A continuation of PHYS 201 covering the topics of electricity and magnetism, light, and modern physics.
CSCE 211: Digital Logic Design
Guidelines for Reports Advanced Constraint Processing
Presentation transcript:

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Course Goal: Understand the basic principles of computer network security and privacy  Wireless network basic  Security  Privacy Read and discuss interesting recent work in several areas of wireless network security and privacy Get involved in wireless network security and privacy research by doing a project Understand how research is done  How to determine what is important  What are the trend

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Administrative Course website:  Announcements Lecture Notes Links to required/recommended readings How to reach me:  Course meeting time: Time: TTH 3:30PM - 4:45PM   Office Hours: TTH 5:00am-6:00pm or by appointment  Office: SWGN 3A54 Recommended reference book:  “Cryptography and Network Security” by William Stallings

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Pre-requisites CSCE 416 Computer Networks Strong motivation

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Tentative topics Wireless networks:  Bluetooth  WiFi/  Vehicular Networks  Sensor Network  RFID (Radio-Frequency Identification) Topics :  Secure localization;  RFID privacy  Spoofing attacks  Jamming attacks  Location privacy in sensor network  Wormhole attacks

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Structure Will run somewhat like a seminar  Course based on presentation and discussion of papers Background reading from online material  I will give the first two lectures: one on network basics and one on security basics  Students are responsible for all of the presentations I may give short discussions on appropriate background for some topics before the presentations  Auditors are expected to read papers and participate One papers per lecture + discussion of progress

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Requirements Presentations and research project  Expect about 1 (perhaps 2, depending on enrollment)  Participate in 1 project ( group project) Read and summarize papers before classes  Summaries will be electronically submitted via dropbox Write 1 position paper  You will “grade” each other’s position paper Participation during classes  At the end of the semester, you must document 3 times that a comment or question from you led to a significant discussion during class

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Grading 20% presentations 10% paper summaries 40% project 10% position paper 20% class discussions and participation

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Presentations Make sure to prepare your presentation well!  Time: 50 minutes  Send me your slides before/after class  Getting slides from authors or other sources is NOT allowed  Grading will be based on how well you (a) organize and deliver your presentation, (b) cover the critical points of the paper, and (c) answer questions  Please, do not make us wait. Set yourself up before the beginning of class The presenter has to come to my office hour at least 48 hours before your presentation! Choose which papers you would like to present and send me  FCFS

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Key points of presentation Be very clear about how much time you have Be very clear about your key message Most good speakers average two minutes per slide (not counting title and outline slides. Each theme should be the subject of a small number of slides Each slide should have clear heading. Make appropriate use of pictures Each slide should normally contain around words

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 A Generic Talk Outline Title/author/affiliation (1 slide) Forecast (1 slide) (optional) Give gist of problem attacked and insight found (What is the one idea you want people to leave with? This is the "abstract" of an oral presentation.) Outline (1 slide) Give talk structure. (Audiences like predictability.) Background  Motivation and Problem Statement (2-3 slides) (Why should anyone care? Most researchers overestimate how much the audience knows about the problem they are attacking.)  Related Work (2-3 slides) Important in the class presentation  Methods (3-6 slide)

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 A Generic Talk Outline Results (3-6 slides)  Present key results and key insights. Do not superficially cover all results; cover key result well. Do not just present numbers; interpret them to give insights. Summary (1 slide) Future Work (1-2 slides)  Give problems this research opens up.  Put down your own opinion. Backup Slides (0-3 slides) Optionally have a few slides ready (not counted in your talk total) to answer expected questions. (Likely question areas: ideas glossed over, shortcomings of methods or results, and future work.)

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Summaries Summaries should describe the key ideas and results  Should also point out good and bad aspects of each paper  Suggestion(s) for future work are highly encouraged  Must not be regurgitation of parts of the paper; use your own words

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Project Participation in projects  Form a team: 3-5 people  Implement the project described in a paper, and validate whether your experiment results are consistent with the one presented in the paper.  Find a problem in a survey paper. Come up with your own solution and validate it.  Combine the course project with your own research project.  The project that you chose has to be approved by me.  It has to be wireless security privacy related.

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Position paper (3 pages) Goal:  Presents an arguable opinion about an issue  Convince the audience that your opinion is valid and worth listening to How:  choose a topic, developing your argument  address all sides of the issue  take one side of the argument  support your argument with evidence  address the counterclaims to show that you are well informed about both sides.

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Policies Make sure you put your course (CSCE790) in the subject of the message. Remember that it is not my emergency if you need help at the last minute. I may check my messages in time to help you make a deadline, but this may not necessarily be the case. Ask specific question instead of general question.  Bad example: “What course project I should work on?”  In general, I will answer quick questions sooner than one that will take a long time to answer In general I will monitor and respond to s during office hours, but in-person students will take precedence.

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Your Best Strategy Come to every lecture Read and summarize papers that will be presented Participate in the discussion during class! Do not wait till last minute to work on project Enjoy the fun!