Date |
Topic |
Readings
(from Reading List) |
Presenters |
Slides |
1/22 | Course Overview; Survey of Wireless Networks | Chapter
on Wireless Networks in Kurose, Ross or other networking text |
Instructor |
Lecture 1 |
1/29 | Survey of Cryptographic Protocols | Appendix
A (Buttyan, Hubaux) or any security/crypto textbook |
Instructor |
Lecture 2 |
1/29 | Security of Existing Wireless Networks | Chapter 1 (Buttyan, Hubaux) | Instructor |
Lecture 3 |
2/5 | Security of Emerging Wireless Networks | Chapter 2, 3 (Buttyan, Hubaux) | Instructor |
Lecture 4 |
2/12, 2/19 |
Secure
Addressing & Naming; Establishing Security Associations |
Chapter
4, 5 (Buttyan, Hubaux) |
Instructor |
Lecture 5 |
2/26 |
Establishing
Security Associations |
Resurrecting
Duckling, SPINS |
Venkatesh, Eric |
spins rd |
3/4 |
Establishing
Security Associations |
LEAP+,
ChanPS |
Adam,
Aparna |
leap, cps |
3/18 |
Establishing
Security Assocations |
HubauxBC,
URSA |
Imran,
John |
ursa, HubauxBC |
3/25 |
Secure
Routing |
KarlofWagner,
Wormhole Attacks |
Meixing,
Venkatesh |
secure-routing, wormhole |
4/1 |
Secure
Routing |
Ariadne,
ParnoLGP |
Eric,
Adam |
ariadne, ParnoLGP |
4/8 |
Secure
Services and Applications |
Guest
Lecture (secure aggregation), Guest Lecture (Node replication attacks) |
Sankar
Roy, Mauro Conti |
|
4/22 |
Secure
Services and Applications |
TinySeRSync,
CapkunRCS, |
Meixing,
Imran |
capkunRCS, tinysersync |
4/29 |
Privacy |
MolnarWagner,
CapkunHJ |
Aparna,
John |
CapkunHJ MolnarWagner |
5/6 |
Project Presentations |