MSc in Web and Smart Systems / Ступінь Магістра в Галузі Веб і Мобільних Систем

Course Details

Course Information Package

Course Unit TitleNETWORK SECURITY
Course Unit CodeACSC523
Course Unit Details
Number of ECTS credits allocated7
Learning Outcomes of the course unitBy the end of the course, the students should be able to:
  1. Explain the underlying principles of network security in wireless technologies.
  2. Describe the operation of cryptographic algorithms and protocols underlying network security applications in mobile systems.
  3. Develop the ability to design and analyze authentication protocols.
  4. Discuss the issue of key management and routing in mobile wireless networks.
  5. Describe the current Web technologies security mechanisms, their attacks and countermeasures.
  6. Develop sufficient knowledge to protect Web applications.
Mode of DeliveryFace-to-face
PrerequisitesNONECo-requisitesNONE
Recommended optional program componentsNONE
Course Contents •  Wireless and Mobile Technologies: Overview of technologies and protocols, security threats and problems
•  Introduction to Security: Security properties, attacks and threats categories, security design at various network layers
•  Cryptography: Symmetric and asymmetric encryption; secure hash functions, Digital signatures, key management
�  Access control:  authentication, design of authentication protocols, applications (Kerberos, public key infrastructure), certificates management, CRLs management, authorization
•  WEB application security: Web Security (Secure Socket Layer (SSL) and Transport Layer Security (TLS), Open Web Application Security Project (OWASP) Top 10 attacks and countermeasures
•  802.11 (Wi–Fi) Security
•  WPA and 802.11i (WPA, EAPOL, EAP, RADIUS)
•  Understand 802.1x protocol packet structure and operation
•  Security in wireless networks:
�  Security in WPAN (802.15 / Bluetooth)
•  Security in WiMax 802.16
•  Security mechanisms in GSM, 3G, UMTS
•  Ad Hoc networks  and wireless sensor networks
o  Secure routing
o  Key management
o  Secure data propagation
•  Thwarting malicious and selfish behavior in wireless environments
•  Key Management protocols over wireless devices (WPA/RSN, TKIP, AES–CCMP)
•  Security Management
•  Future Developments
Recommended and/or required reading:
Textbooks
  • "Security and Cooperation in Wireless Networks" by Levente Buttyan and Jean-Pierre Hubaux, 2007.
  • “Implementing 802.1X Security Solutions for Wired and Wireless Networks”, Jim Geier, 2008.
  • “Security In Wireless LANS And MANS,” Thomas Hardjono, Lakshminath R. Dondeti, 2005.
  • “Real 802.11 Security: Wi–Fi Protected Access and 802..11i” Jon Edney, William A. Arbaugh,2003.
  • “Security for Ubiquitous Computing,” Frank Stajano, June 15, 2002.
References
  • W. Stallings, “Network Security Essentials: Applications and Standards”, Prentice Hall, 3rd Ed., 2007, ISBN 0-13-238033-1.
  • M. Bishop, “Intro to Computer and Network Security”, 2005.
  • Kaufman, Perlman, “Network security: Private communication in a public world”
  • C.P. Pfleeger and S.L. Pfleeger, “Security in Computing”, Prentice Hall, 4th Ed., 2007, ISBN 0-13-239077-9.
  • W. Stallings and L. Brown, “Computer Security: Principles and Practice”, Prentice Hall, 1st Ed., 2008, ISBN 0-13-600424-5.
  • Wenjing Lou and Yuguang Fang, “A Survey on Wireless Security in Mobile Ad Hoc Networks: Challenges and Possible Solutions”, 2007.
  • George Hadjichristofi, A. Pipis, V. Vasiliou, and A. Pitsillides, “Security in Sensor Networks”, 2009.
  • G. Hadjichristofi, J. Adams, and N. Davis, “A Framework for Key Management in Ad hoc networks,” 2005.
  • Yih-Chun Hu, Adrian Perrig, David B. Johnson “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks”, 2002.
  • “SPINS: Security Protocols for Sensor Networks” Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar, 2001.
  • “Bluetooth™ Security White Paper” Bluetooth SIG Security Expert Group, 2002.
  • “Certificate Revocation System Based on Peer-to-Peer CRL Distribution” Matei Ciobanu Morogan, Sead Muftic, Proceedings of the DMS 03 conference, Miami, US, September 2003.
  • “Wireless Network Security: 802.11, Bluetooth, and Handheld Devices,” National Institute of Standards and Technology Special publication 800–48.
  • Q. Li, S. Zhu and G. Cao, "Routing in Socially Selfish Delay Tolerant Networks," infocom 2010, San Diego, CA, March 2010, pp. 1-9.
  • I.R. Chen, F. Bao, M.J. Chang, and J.H. Cho,"Trust Management for Encounter-based Routing in Delay Tolerant Networks," IEEE Globecom 2010.
Planned learning activities and teaching methodsThe taught part of course is delivered to the students by means of lectures, conducted with the help of computer presentations. Lecture notes and presentations are available through the web for students to use in combination with the textbooks. Furthermore theoretical principles are explained by means of specific examples and solution to specific problems.
Lectures are supplemented with unsupervised computer laboratory and homework where students apply their gained knowledge and identify the principles taught in the lecture sessions.
The course will also utilize research paper analysis and presentation allowing students to gain knowledge on the state of the art on specific security topics.
Assessment methods and criteria
Paper Presentation & analysis of state of the art 10%
Assignments10%
Midterm20%
Final Exam60%
Language of instructionEnglish
Work placement(s)NO

 Друк  E-mail