Download presentation
Presentation is loading. Please wait.
1
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008
2
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Course Goal: Understand the basic principles of computer network security and privacy Wireless network basic Security Privacy Read and discuss interesting recent work in several areas of wireless network security and privacy Get involved in wireless network security and privacy research by doing a project Understand how research is done How to determine what is important What are the trend
3
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Administrative Course website: http://www.cse.sc.edu/~wyxu/2008-csce790/csce790.htm Announcements Lecture Notes Links to required/recommended readings How to reach me: Course meeting time: Time: TTH 3:30PM - 4:45PM Email: wyxu@engr.sc.edu Office Hours: TTH 5:00am-6:00pm or by appointment Office: SWGN 3A54 Recommended reference book: “Cryptography and Network Security” by William Stallings
4
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Pre-requisites CSCE 416 Computer Networks Strong motivation
5
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Tentative topics Wireless networks: Bluetooth WiFi/802.11 Vehicular Networks Sensor Network RFID (Radio-Frequency Identification) Topics : Secure localization; RFID privacy Spoofing attacks Jamming attacks Location privacy in sensor network Wormhole attacks
6
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Structure Will run somewhat like a seminar Course based on presentation and discussion of papers Background reading from online material I will give the first two lectures: one on network basics and one on security basics Students are responsible for all of the presentations I may give short discussions on appropriate background for some topics before the presentations Auditors are expected to read papers and participate One papers per lecture + discussion of progress
7
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Requirements Presentations and research project Expect about 1 (perhaps 2, depending on enrollment) Participate in 1 project ( group project) Read and summarize papers before classes Summaries will be electronically submitted via dropbox Write 1 position paper You will “grade” each other’s position paper Participation during classes At the end of the semester, you must document 3 times that a comment or question from you led to a significant discussion during class
8
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Grading 20% presentations 10% paper summaries 40% project 10% position paper 20% class discussions and participation
9
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Presentations Make sure to prepare your presentation well! Time: 50 minutes Send me your slides before/after class Getting slides from authors or other sources is NOT allowed Grading will be based on how well you (a) organize and deliver your presentation, (b) cover the critical points of the paper, and (c) answer questions Please, do not make us wait. Set yourself up before the beginning of class The presenter has to come to my office hour at least 48 hours before your presentation! Choose which papers you would like to present and send me email FCFS
10
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Key points of presentation Be very clear about how much time you have Be very clear about your key message Most good speakers average two minutes per slide (not counting title and outline slides. Each theme should be the subject of a small number of slides Each slide should have clear heading. Make appropriate use of pictures Each slide should normally contain around 25-35 words
11
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 A Generic Talk Outline Title/author/affiliation (1 slide) Forecast (1 slide) (optional) Give gist of problem attacked and insight found (What is the one idea you want people to leave with? This is the "abstract" of an oral presentation.) Outline (1 slide) Give talk structure. (Audiences like predictability.) Background Motivation and Problem Statement (2-3 slides) (Why should anyone care? Most researchers overestimate how much the audience knows about the problem they are attacking.) Related Work (2-3 slides) Important in the class presentation Methods (3-6 slide) http://pages.cs.wisc.edu/~markhill/conference-talk.html#outline
12
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 A Generic Talk Outline Results (3-6 slides) Present key results and key insights. Do not superficially cover all results; cover key result well. Do not just present numbers; interpret them to give insights. Summary (1 slide) Future Work (1-2 slides) Give problems this research opens up. Put down your own opinion. Backup Slides (0-3 slides) Optionally have a few slides ready (not counted in your talk total) to answer expected questions. (Likely question areas: ideas glossed over, shortcomings of methods or results, and future work.) http://pages.cs.wisc.edu/~markhill/conference-talk.html#outline
13
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Summaries Summaries should describe the key ideas and results Should also point out good and bad aspects of each paper Suggestion(s) for future work are highly encouraged Must not be regurgitation of parts of the paper; use your own words
14
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Project Participation in projects Form a team: 3-5 people Implement the project described in a paper, and validate whether your experiment results are consistent with the one presented in the paper. Find a problem in a survey paper. Come up with your own solution and validate it. Combine the course project with your own research project. The project that you chose has to be approved by me. It has to be wireless security privacy related.
15
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Position paper (3 pages) Goal: Presents an arguable opinion about an issue Convince the audience that your opinion is valid and worth listening to How: choose a topic, developing your argument address all sides of the issue take one side of the argument support your argument with evidence address the counterclaims to show that you are well informed about both sides.
16
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Email Policies Make sure you put your course (CSCE790) in the subject of the message. Remember that it is not my emergency if you need help at the last minute. I may check my messages in time to help you make a deadline, but this may not necessarily be the case. Ask specific question instead of general question. Bad example: “What course project I should work on?” In general, I will answer quick questions sooner than one that will take a long time to answer In general I will monitor and respond to emails during office hours, but in-person students will take precedence.
17
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system 2008 Your Best Strategy Come to every lecture Read and summarize papers that will be presented Participate in the discussion during class! Do not wait till last minute to work on project Enjoy the fun!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.