CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

1 / 17
About This Presentation
Title:

CSCE790: Security and Privacy for Emerging Ubiquitous Communication system

Description:

Get involved in wireless network security and privacy research by doing a project ... on appropriate background for some topics before the presentations ... –

Number of Views:90
Avg rating:3.0/5.0
Slides: 18
Provided by: vero249
Learn more at: https://cse.sc.edu
Category:

less

Transcript and Presenter's Notes

Title: CSCE790: Security and Privacy for Emerging Ubiquitous Communication system


1
CSCE790 Security and Privacy for Emerging
Ubiquitous Communication system
  • Wenyuan Xu
  • Department of Computer Science and Engineering
  • University of South Carolina
  • 2008

2
Course Goal
  • Understand the basic principles of computer
    network security and privacy
  • Wireless network basic
  • Security
  • Privacy
  • Read and discuss interesting recent work in
    several areas of wireless network security and
    privacy
  • Get involved in wireless network security and
    privacy research by doing a project
  •  Understand how research is done
  • How to determine what is important
  • What are the trend

3
Administrative
  • Course website
  • http//www.cse.sc.edu/wyxu/2008-csce790/csce790.h
    tm
  • Announcements
  • Lecture Notes
  • Links to required/recommended readings
  • How to reach me
  • Course meeting time Time TTH 330PM - 445PM
  • Email wyxu_at_engr.sc.edu
  • Office Hours TTH 500am-600pm or by appointment
  • Office SWGN 3A54
  • Recommended reference book
  • Cryptography and Network Security by William
    Stallings

4
Pre-requisites
  • CSCE 416 Computer Networks
  • Strong motivation

5
Tentative topics
  • Wireless networks
  • Bluetooth
  • WiFi/802.11
  • Vehicular Networks
  • Sensor Network
  • RFID (Radio-Frequency Identification)
  • Topics
  • Secure localization
  • RFID privacy
  • Spoofing attacks
  • Jamming attacks
  • Location privacy in sensor network
  • Wormhole attacks

6
Structure
  • Will run somewhat like a seminar
  • Course based on presentation and discussion of
    papers
  • Background reading from online material
  • I will give the first two lectures one on
    network basics and one on security basics
  • Students are responsible for all of the
    presentations
  • I may give short discussions on appropriate
    background for some topics before the
    presentations
  • Auditors are expected to read papers and
    participate
  • One papers per lecture discussion of progress

7
Requirements
  • Presentations and research project
  • Expect about 1 (perhaps 2, depending on
    enrollment)
  • Participate in 1 project ( group project)
  • Read and summarize papers before classes
  • Summaries will be electronically submitted via
    dropbox
  • Write 1 position paper
  • You will grade each others position paper
  • Participation during classes
  • At the end of the semester, you must document 3
    times that a comment or question from you led to
    a significant discussion during class

8
Grading
  • 20 presentations
  • 10 paper summaries
  • 40 project
  • 10 position paper
  • 20 class discussions and participation

9
Presentations
  • Make sure to prepare your presentation well!
  • Time 50 minutes
  • Send me your slides before/after class
  • Getting slides from authors or other sources is
    NOT allowed
  • Grading will be based on how well you (a)
    organize and deliver your presentation, (b) cover
    the critical points of the paper, and (c) answer
    questions
  • Please, do not make us wait. Set yourself up
    before the beginning of class
  • The presenter has to come to my office hour at
    least 48 hours before your presentation!
  • Choose which papers you would like to present and
    send me email
  • FCFS

10
Key points of presentation
  • Be very clear about how much time you have
  • Be very clear about your key message
  • Most good speakers average two minutes per slide
    (not counting title and outline slides.
  • Each theme should be the subject of a small
    number of slides
  • Each slide should have clear heading.
  • Make appropriate use of pictures
  • Each slide should normally contain around 25-35
    words

11
A Generic Talk Outline
  • Title/author/affiliation (1 slide)
  • Forecast (1 slide) (optional)Give gist of
    problem attacked and insight found (What is the
    one idea you want people to leave with? This is
    the "abstract" of an oral presentation.)
  • Outline (1 slide)Give talk structure. (Audiences
    like predictability.)
  • Background
  • Motivation and Problem Statement (2-3
    slides)(Why should anyone care? Most researchers
    overestimate how much the audience knows about
    the problem they are attacking.)
  • Related Work (2-3 slides)Important in the class
    presentation
  • Methods (3-6 slide)

http//pages.cs.wisc.edu/markhill/conference-talk
.htmloutline
12
A Generic Talk Outline
  • Results (3-6 slides)
  • Present key results and key insights.
  • Do not superficially cover all results cover key
    result well.
  • Do not just present numbers interpret them to
    give insights.
  • Summary (1 slide)
  • Future Work (1-2 slides)
  • Give problems this research opens up.
  • Put down your own opinion.
  • Backup Slides (0-3 slides)Optionally have a few
    slides ready (not counted in your talk total) to
    answer expected questions. (Likely question
    areas ideas glossed over, shortcomings of
    methods or results, and future work.)

http//pages.cs.wisc.edu/markhill/conference-talk
.htmloutline
13
Summaries
  • Summaries should describe the key ideas and
    results
  • Should also point out good and bad aspects of
    each paper
  • Suggestion(s) for future work are highly
    encouraged
  • Must not be regurgitation of parts of the paper
    use your own words

14
Project
  • Participation in projects
  • Form a team 3-5 people
  • Implement the project described in a paper, and
    validate whether your experiment results are
    consistent with the one presented in the paper.
  • Find a problem in a survey paper. Come up with
    your own solution and validate it.
  • Combine the course project with your own research
    project.
  • The project that you chose has to be approved by
    me.
  • It has to be wireless security privacy related.

15
Position paper (3 pages)
  • Goal
  • Presents an arguable opinion about an issue
  • Convince the audience that your opinion is valid
    and worth listening to
  • How
  • choose a topic, developing your argument
  • address all sides of the issue
  • take one side of the argument
  • support your argument with evidence
  • address the counterclaims to show that you are
    well informed about both sides.

16
Email Policies
  • Make sure you put your course (CSCE790)  in the
    subject of the message.
  • Remember that it is not my emergency if you need
    help at the last minute. I may check my messages
    in time to help you make a deadline, but this may
    not necessarily be the case.
  • Ask specific question instead of general
    question.
  • Bad example What course project I should work
    on?
  • In general, I will answer quick questions sooner
    than one that will take a long time to answer
  • In general I will monitor and respond to emails
    during office hours, but in-person students will
    take precedence.

17
Your Best Strategy
  • Come to every lecture
  • Read and summarize papers that will be presented
  • Participate in the discussion during class!
  • Do not wait till last minute to work on project
  • Enjoy the fun!
Write a Comment
User Comments (0)
About PowerShow.com