|
Abstract: As a user of the Internet, you are fortunate to be tied into the
world's greatest communication and information exchange - but not
without a price. As a result of this connection, your computer, your
organization's network, and everywhere the network reaches are all
vulnerable to potentially disastrous infiltration by hackers. [W.
Cheswick. Firewalls and Internet Security]
|
Synopsis:
- Seminar, Praktische Informatik, Hauptstudium.
- 2h each week, over one semester (2 SWS).
- Students will present a selection of papers that
will help you understand which threats exist, judge their
significance and learn methods to defend your system against
hackers. In addition you will explore the mathematical underpinnings
of today's most common security tools and protocols. But most of all
you will learn that there is no absolute security - i.e. your will
have to learn ways to detect security breaches and recover from
them.
Credits:
In order to obtain credits for this seminar,
participants are expected to:
- Attend regularly (at least 90%).
- Read each paper before the seminar, to be adequately prepared for
discussion.
- Research an assigned subject; present
major findings (45 min presentation; 30 min
discussion).
- Presentations will be evaluated by two members of
the audience at the end of each class (Bewertungskriterien-Seminarvortrag.pdf).
- Presenters summarize their presentation and relevant
discussion on the Seminar's WIKI page within 2 weeks.
- Presentations may be given in English or German. All documents are in
English (exceptions may be granted).
Prerequisites:
- This seminar is suitable for students of all
technical science disciplines who have previously completed courses PI 1,2,3
or equivalent.
Wiki:
Syllabus:
|
2.
Secure Routing |
|
-
Reviews, general papers
-
Reaktiv (on demand)
-
[Hu02c]
Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks,
Yih-Chun Hu, Adrian Perrig, David B. Johnson,
http://citeseer.ist.psu.edu/531013.html
http://www.ece.cmu.edu/~adrian/projects/secure-routing/ariadne.pdf
-
[Kong03a]
An
Anonymous On Demand Routing Protocol with Untraceable Routes for
Mobile Ad-hoc Networks, Jiejun Kong, Xiaoyan Hong, Mario
Gerla,
http://www.cs.ucla.edu/~jkong/publications/CSD-TR030020.pdf
-
[Pap02a]
The
Secure Routing Protocol (SRP) for Ad Hoc Networks,
Panagiotis Papadimitratos, Zygmunt J. Haas, Prince Samar,
http://www.people.cornell.edu/pages/pp59/Docs/draft-secure_routing_for_ad_hoc_networks-00.pdf
-
[San02]
A Secure
Routing Protocol for Ad Hoc Networks, Kimaya Sanzgiri,
Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M.
Belding-Royer,
http://www.ece.cmu.edu/~adrian/731-sp05/readings/SDLSB-aran.pdf
-
[Yi01a]
Security-aware Routing Protocol for Wireless Ad Hoc Networks,
Seung Yi, Prasad Naldurg, Robin Kravets,
http://www-sal.cs.uiuc.edu/~rhk/pubs/SCI2002.pdf
-
[ZhaYa05]
Anonymous Communications in Mobile Ad Hoc Networks,
Yanchao Zhang, Wei Liu, Wenjing Lou,
http://ece.wpi.edu/~wjlou/publication/INFOCOM05_Zhang.pdf
-
Protocol extensions
|
|
3.
Key Management, Authentication |
|
-
Distributed Keymanagement
-
[Kong01]
Providing
robust and ubiquitous security support for mobile ad-hoc
networks, Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu
Lu, Lixia Zhang,
http://www.cs.ucla.edu/~jkong/publications/ICNP01-jkong.pdf
-
[Leh03]
Shared RSA
Key Generation in a Mobile Ad Hoc Network, Brian Lehane
, Linda Doyle , Donal O'Mahony,
http://ntrg.cs.tcd.ie/lehaneb/papers/milcom03.pdf
-
[Schi04]
Key
Management and Distribution for Threshold Cryptography Schemes,
Fabian Schilcher,
http://www13.informatik.tu-muenchen.de/lehre/seminare/WS0304/UB-hs/FabianSchilcher_KeyManagement_report.pdf
-
[Yi01b]
Practical
PKI for Ad Hoc Wireless Networks, Seung Yi, Robin
Kravets,
http://ncstrl.cs.uiuc.edu/Dienst/Repository/2.0/Body/ncstrl.uiuc_cs/UIUCDCS-R-2002-2273/pdf
[Yi02b]
Key
Management for Heterogeneous Ad Hoc Wireless Networks,
Seung Yi, Robin Kravets,
http://www-sal.cs.uiuc.edu/~rhk/pubs/tr-2290-1734.pdf [Yi03a]
MOCA: Mobile Certificate Authority for Wireless Ad
Hoc Networks, Seung Yi, Robin Kravets,
http://middleware.internet2.edu/pki03/presentations/06.pdf
-
[ZhoL99]
Securing
Ad Hoc Networks, Lidong Zhou, Zygmunt J. Haas,
http://www.cs.cornell.edu/home/ldzhou/adhoc.pdf
[ZhoL00]
COCA: A
Secure Distributed Online Certification Authority,
Lidong Zhou, Fred B. Schneider, Robbert van Renesse,
http://www.cs.cornell.edu/fbs/publications/cocaTOCS.pdf
-
Selforganizing Infrastructure (Web of
Trust, Small worlds)
-
Resurrecting Duckling
-
Cryptobased Identities
-
Keyestablishment Protocols, Group
Keymanagement
|
Presentation assignments:
Templates for presentation
[Powerpoint],
[OOImpress v.2.0]
Date |
Presenter |
Topic |
Slides |
24.10.2005 |
Wolf Müller |
Administrative remarks |
[pdf] |
31.10.2005 |
Wolf Müller |
Introduction |
[pdf] |
07.11.2005 |
Habib Shakhawat |
Attacks: General |
[pdf] |
14.11.2005 |
Robert Göttsch |
Attacks: Active |
[pdf] |
21.11.2005 |
Stefan Jordan |
Attacks: Passive |
|
28.11.2005 |
canceled |
|
|
05.12.2005 |
Enno Gröper |
Secure Routing: Reviews |
[pdf] |
12.12.2005 |
Lutz Lippke |
Secure Routing: Reaktiv |
[pdf] |
09.01.2006 |
Knut Müller |
Key Manegement: Genaral |
[pdf] |
16.01.2006 |
Marty Rosner |
Key Manegement: Distributed |
missing |
23.01.2006 |
Chris Helbing |
Key Manegement: Resurrecting Duckeling |
[pdf] |
30.01.2006 |
Johannes Fichte |
Key Manegement: Cryptobased Identities |
[pdf] |
06.02.2006 |
Juan Luis Nunez Cabello |
Key Manegement: Keyestabishment Protokolls,
Group Keys |
[pdf] |
13.02.2006 |
Stefan Jordan |
Attacks: Passive |
[pdf] |
Further Readings (Books):
- Ross Anderson. Security Engineering: A
Guide to Building Dependable Distributed Systems. ISBN
0471389226
- Bruce Schneier. Applied Cryptography:
Protocols, Algorithms, and Source Code in C, Second Edition.
ISBN
0471117099
|
|
|