Survey
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008 Course Goal: Understand the basic principles of computer network security and privacy Wireless network basic Security Privacy Read and discuss interesting recent work in several areas of wireless network security and privacy Get involved in wireless network security and privacy research by doing a project Understand how research is done 2008 How to determine what is important What are the trend CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Administrative Course website: http://www.cse.sc.edu/~wyxu/2008-csce790/csce790.htm How to reach me: Course meeting time: Time: TTH 3:30PM - 4:45PM Email: wyxu@engr.sc.edu Office Hours: TTH 5:00am-6:00pm or by appointment Office: SWGN 3A54 Recommended reference book: 2008 Announcements Lecture Notes Links to required/recommended readings “Cryptography and Network Security” by William Stallings CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Pre-requisites CSCE 416 Computer Networks Strong motivation 2008 CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Tentative topics Wireless networks: Topics : 2008 Bluetooth WiFi/802.11 Vehicular Networks Sensor Network RFID (Radio-Frequency Identification) Secure localization; RFID privacy Spoofing attacks Jamming attacks Location privacy in sensor network Wormhole attacks CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Structure Will run somewhat like a seminar Course based on presentation and discussion of papers Background reading from online material I will give the first two lectures: one on network basics and one on security basics Students are responsible for all of the presentations I may give short discussions on appropriate background for some topics before the presentations Auditors 2008 are expected to read papers and participate One papers per lecture + discussion of progress CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Requirements Presentations and research project Read and summarize papers before classes You will “grade” each other’s position paper Participation during classes 2008 Summaries will be electronically submitted via dropbox Write 1 position paper Expect about 1 (perhaps 2, depending on enrollment) Participate in 1 project ( group project) At the end of the semester, you must document 3 times that a comment or question from you led to a significant discussion during class CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Grading 20% presentations 10% paper summaries 40% project 10% position paper 20% class discussions and participation 2008 CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Presentations Make sure to prepare your presentation well! Time: 50 minutes Send me your slides before/after class Getting slides from authors or other sources is NOT allowed Grading will be based on how well you (a) organize and deliver your presentation, (b) cover the critical points of the paper, and (c) answer questions Please, do not make us wait. Set yourself up before the beginning of class The presenter has to come to my office hour at least 48 hours before your presentation! Choose which papers you would like to present and send me email 2008 FCFS CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Key points of presentation 2008 Be very clear about how much time you have Be very clear about your key message Most good speakers average two minutes per slide (not counting title and outline slides. Each theme should be the subject of a small number of slides Each slide should have clear heading. Make appropriate use of pictures Each slide should normally contain around 25-35 words CSCE790: Security and Privacy for Emerging Ubiquitous Communication system A Generic Talk Outline Title/author/affiliation (1 slide) Forecast (1 slide) (optional) Give gist of problem attacked and insight found (What is the one idea you want people to leave with? This is the "abstract" of an oral presentation.) Outline (1 slide) Give talk structure. (Audiences like predictability.) Background Motivation and Problem Statement (2-3 slides) (Why should anyone care? Most researchers overestimate how much the audience knows about the problem they are attacking.) Related Work (2-3 slides) Important in the class presentation Methods (3-6 slide) http://pages.cs.wisc.edu/~markhill/conference-talk.html#outline 2008 CSCE790: Security and Privacy for Emerging Ubiquitous Communication system A Generic Talk Outline Results (3-6 slides) Present key results and key insights. Do not superficially cover all results; cover key result well. Do not just present numbers; interpret them to give insights. Summary (1 slide) Future Work (1-2 slides) Give problems this research opens up. Put down your own opinion. Backup Slides (0-3 slides) Optionally have a few slides ready (not counted in your talk total) to answer expected questions. (Likely question areas: ideas glossed over, shortcomings of methods or results, and future work.) http://pages.cs.wisc.edu/~markhill/conference-talk.html#outline 2008 CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Summaries Summaries should describe the key ideas and results Should also point out good and bad aspects of each paper Suggestion(s) for future work are highly encouraged Must not be regurgitation of parts of the paper; use your own words 2008 CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Project Participation in projects Form a team: 3-5 people Implement the project described in a paper, and validate whether your experiment results are consistent with the one presented in the paper. Find a problem in a survey paper. Come up with your own solution and validate it. Combine the course project with your own research project. The project that you chose has to be approved by me. 2008 It has to be wireless security privacy related. CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Position paper (3 pages) Goal: Presents an arguable opinion about an issue Convince the audience that your opinion is valid and worth listening to How: choose a topic, developing your argument address all sides of the issue take one side of the argument support your argument with evidence address the counterclaims to show that you are well informed about both sides. 2008 CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Email Policies Make sure you put your course (CSCE790) in the subject of the message. Remember that it is not my emergency if you need help at the last minute. I may check my messages in time to help you make a deadline, but this may not necessarily be the case. Ask specific question instead of general question. 2008 Bad example: “What course project I should work on?” In general, I will answer quick questions sooner than one that will take a long time to answer In general I will monitor and respond to emails during office hours, but in-person students will take precedence. CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Your Best Strategy Come to every lecture Read and summarize papers that will be presented Participate in the discussion during class! Do not wait till last minute to work on project Enjoy the fun! 2008 CSCE790: Security and Privacy for Emerging Ubiquitous Communication system