|&nbs p;||CSE713 Wireless Networks Security - Principles And Practices
Prof. Shambhu Upadhyaya
Course Organization:One 2 hour class per week. This includes several instructor presentations and student presentations. Students can investigate research problems or engage in projects - simulation based or hands-on experiments in this seminar course.
Overview of Security Issues in Wireless Networks, WEP Security, WPA and RSN, Security of MANETs, Security of Sensor Networks, Wireless Mesh Networks and Security, Trust in Wireless Networks, Vehicular Networks Security, Smart Grid Security and Security of Internet of Things (IoT)
Prerequisites: A course on Computer Networks and basic knowledge of
computer security. Some programming experience is essential.
Expanded Description:Wireless networking/computing is becoming increasingly popular. However due to power, size and bandwidth limitations, the network and security management of wireless nodes has become fragile. As a starting point, wireless networks have adopted many security mechanisms from the wired world. But due to the inherent limitations, they are more vulnerable to attacks than the wired network. Threats like intercepting and unauthorized access to wireless traffic are prevalent these days. More mature solutions to the security problems demand the need of understanding the current technologies and the security flaws.
The seminar will start with a sweeping overview of Wireless Networking, Security issues in Wireless Networks and the Challenges, Threats and Hacking Methodologies. We will then cover Routing Security in Mobile Ad hoc Networks, Sensor Networks Security (Attacks and Countermeasures), Robust Localization in Sensor Networks, Security in Wireless Mesh Networks, Trust issues in MANETs, and QoS-Aware MAC Protocols and their security implications. We will also look into Vehicular Networks Security, Smart Grid Security and Security of Internet of Things (IoT), depending upon the student interests and time.
Most of the topics will be from research papers and Internet documents. Topics will be assigned to or selected by students who are required to study them, prepare presentations and discuss and critique them in the class. The Wireless Networks Security lab in 301C Davis could be used to perform certain security experiments.
Academic integrity:The value of our courses, grades, degrees and research findings are dependent upon adherence to standards of ethical conduct. Plagiarism and inappropriate collaboration will not be tolerated. In this course we will adhere to the departmental standard for academic integrity, as follows:
As a good rule of thumb, you may discuss any problem in the course as long as no one is using a writing implement (computers included) nor looking at any source code for the assignment. That is, any group work must be verbal only. Obviously you may look at the textbook or class handouts/class notes together. One exception to this rule is that when a friend is having trouble with a small bug, and you notice a typo or other "silly little mistake," you may point it out to them. More substantive assistance is definitely not allowed , from any source whatsoever, including tutors or friends not enrolled in the course. The professor or teaching assistants will be able to give more help if you are stuck with concepts.
All academic work must be your own. Collaboration, usually evidenced by unjustifiable similarity in assignments, is never allowed. Plagiarism, defied as copying or receiving materials from a source or sources and submitting this material as one's own without acknowledging the particular debts to the source (quotations, paraphrases, basic ideas), or otherwise representing the work of another as one's own, is never allowed. After an appropriate informal review, if any students are found in violation of maintaining academic integrity, sanctions will be imposed, which can be as severe as receiving an F in the course. Especially flagrant violations will be considered under formal review proceedings, which can call for harsher sanctions including expulsion from the University. If you ever have any questions or concerns regarding the policy, particularly as it relates to this course, see your instructor.
Additional information on University-wide policies and procedures is contained in UB Catalog Statement on Academic Integrity.
Last Updated: 02/11/17