KAIST CS712 병렬처리 특강 차세대 센서 네트워크 및 네트워크 보안 동향 Syllabus 2009. 9. 1 Network & Security Lab.

Slides:



Advertisements
Similar presentations
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Advertisements

Presented by : Poorya Ghafoorpoor Yazdi Eastern Mediterranean University Mechanical Engineering Department Master Thesis Presentation Eastern Mediterranean.
Introduction to Wireless Sensor Networks
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Distributed Detection Of Node Replication Attacks In Sensor Networks Presenter: Kirtesh Patil Acknowledgement: Slides on Paper originally provided by Bryan.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Chapter 1 – Introduction
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Welcome to CS580S!!! KD Kang. What are sensor networks? Small, wireless, battery-powered sensors MICA2 mote Smart Dust.
Topics in Internet Research
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Approaches to Cluster Formation in Wireless Sensor Networks Jimmy Wilson CS 526.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Wireless Sensor Network Security Anuj Nagar CS 590.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
CS Dept, City Univ.1 Research Issues in Wireless Sensor Networks Prof. Xiaohua Jia Dept. of Computer Science City University of Hong Kong.
Key management in wireless sensor networks Kevin Wang.
CS230 Project Mobility in Energy Harvesting Wireless Sensor Network Nga Dang, Henry Nguyen, Xiujuan Yi.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
An Energy-efficient Target Tracking Algorithm in Wireless Sensor Networks Wang Duoqiang, Lv Mingke, Qin Qi School of Computer Science and technology Huazhong.
Introduction To Wireless Sensor Networks Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting of spatially distributed.
Sensor Networks Lecture 7. Sensor Networks Special case of the general ad hoc networking problem Much more resource constrained than a network of PDAs.
Wireless Sensor Networks CS 4501 Professor Jack Stankovic Department of Computer Science Fall 2010.
차세대 무선 네트워크 및 보안 2008 Fall CS710 Class in KAIST m ulti m edia c omputing laboratory MAL(Mobile-Assisted Localization) in Wireless Sensor Networks Choi.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
Wireless Sensor Network Jing (Selena) He Department of Computer Science Kennesaw State University.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Distributed Computing Rik Sarkar. Distributed Computing Old style: Use a computer for computation.
Microcontroller-Based Wireless Sensor Networks
Network Security CS nd Term Course Syllabus Cairo University Faculty of Computers and Information.
KAIST CS710 컴퓨터구조 특강 무선 센서네트워크 응용 및 보안 Syllabus Network & Security Lab.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Introduction to Mobile Computing -CSE 535 Fall 2007 Sandeep K. S. Gupta School of Computing and Informatics Arizona State University.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
KAIS T CS712 병렬처리 특강 - 차세대 무선네트워크 응용 및 보안 - Syllabus Network & Security Lab.
CSE 534: Advanced Computer Networks
CprE D.Q.1 Random Thoughts on MobiCom 2004.
KAIST CS710 컴퓨터구조 특강 유비쿼터스 네트워크와 보안 Syllabus Network & Security Lab.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Research Overview Sencun Zhu Asst. Prof. CSE/IST, PSU
SENSOR NETWORKS BY Umesh Shah Mayuresh Patil G P Reddy GUIDES Prof U.B.Desai Prof S.N.Merchant.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
8/25/2010CS 686 Course Outline and Questionnaire EJ Jung CS 686 Special Topics in CS Privacy and Security.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Ad Hoc Network.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Wireless sensor and actor networks: research challenges
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
June All Hands Meeting Security in Sensor Networks Tanya Roosta Chris Karlof Professor S. Sastry.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Wireless Sensor Networks
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
KAIST CS710 Topics in Computational Architecture Wireless Networks and Security : Issues, Challenges and Research Trends Syllabus Network &
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
In the name of God.
Introduction to Information Security
Introduction to Wireless Sensor Networks
EEL 6935 Wireless Ad Hoc Networks
Connected Sensor Cover Problem
Presentation transcript:

KAIST CS712 병렬처리 특강 차세대 센서 네트워크 및 네트워크 보안 동향 Syllabus Network & Security Lab.

CS712 병렬처리 특강 – 차세대 센서 네트워크 및 네트워크 보안 동향 Class outline Goal To understand the state of the art technologies in Wireless Sensor Networks and Network Security Topics Wireless Sensor Network Wireless Network Security Issues Web Security Issues 2 / 8

Class outline Class Hour and Classroom TUE&THU 1:00-2:30 pm, #3444 ( 제 5 강의실 ) Course description Key papers for each subject (Scheduled at random) Two presentation for each person, 2 or 3 presentation each class Presentation material must be uploaded to web board at least a day ahead the class Submit critique before starting the class Problem definition, Key idea, Weak point, Improving point, etc. Subject : _ _ 홍길동, File name : _ _ 홍길 동.doc CS712 병렬처리 특강 – 차세대 센서 네트워크 및 네트워크 보안 동향 3 / 8

Class outline Research topics for individual paper writing Wireless Sensor Networks Energy-efficient routing control, clustering and topology control Positioning and localization, data aggregation algorithms Wireless Network Security Distributed(Central) and multi-hop authentication, Efficient key management Web Security The Method for resolving Client-Side Security Issues Project Proposal Due : October CS712 병렬처리 특강 – 차세대 센서 네트워크 및 네트워크 보안 동향 4 / 8

Class outline Grading No exam Critiques Presentations (Peer Review) Term project Teaching assistant 이민수 (mslee { ⓐ } nslab.kaist.ac.kr) CS712 병렬처리 특강 – 차세대 센서 네트워크 및 네트워크 보안 동향 5 / 8

Mobile Sensor Networks Sensors may be enhanced with mobility Mobile Sensor may be more powerful and can re-charge themselves autom atically Robot area, CarTel, Surveillance ecosystem… Resilient to failures, Reactive to events, Support disparate missions Research Directions on Mobile Sensor Networks Improve network topology, WSN deployment, WSN fault diagnosis Enhance sensing and routing in WSN Applications CS712 병렬처리 특강 – 차세대 센서 네트워크 및 네트워크 보안 동향 6 / 8

WSN Security Limited Resources - Memory, Storage Space, Power Energy Unreliable Communication Unreliable Transfer, Conflicts, Latency, Physical Attacks,… Have to satisfy security requirements in the limited resource Data confidentiality, integrity, freshness, authentication… Applications Measure humidity, temperature, pressure Detect nuclear, biological, chemical attacks Detect fire, flood, earth-quake, environment pollution Military, health and security applications CS712 병렬처리 특강 – 차세대 센서 네트워크 및 네트워크 보안 동향 7 / 8

Web Security Issues The attack of targeting the web clients is to be increasing The attacks collect the user privacy information and use the his computing resources Existing prevention methods in server-side can not prevent it. Phishing, Spyware, XSS Attacks The Method for resolving Client-Side Security Issues Anti-Phishing Approaches Phishing Detection, Authentication Method for web environments Anti-Spyware Approaches Spyware detection The Novel Browser Security Model To adjust Security Policy in user’s browser 8 / 8 CS712 병렬처리 특강 – 차세대 센서 네트워크 및 네트워크 보안 동향