| Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]
|
Synopsis:- Seminar, Praktische Informatik, Hauptstudium.
- 2h each week, over one semester (2 SWS).
- Students will present a selection of papers that will help you understand which threats exist, judge their significance and learn methods to defend your system against hackers. In addition you will explore the mathematical underpinnings of today's most common security tools and protocols. But most of all you will learn that there is no absolute security - i.e. your will have to learn ways to detect security breaches and recover from them.
Credits: In order to obtain credits for this seminar, participants are expected to: - Attend regularly (at least 90%).
- Read each paper before the seminar, to be adequately prepared for discussion.
- Research an assigned subject; present major findings (45 min presentation; 30 min discussion).
- Presentations will be evaluated by two members of the audience at the end of each class (Bewertungskriterien-Seminarvortrag.pdf).
- Presenters summarize their presentation and relevant discussion on the Seminar's WIKI page within 2 weeks.
- Presentations may be given in English or German. All documents are in English (exceptions may be granted).
Prerequisites: - This seminar is suitable for students of all technical science disciplines who have previously completed courses PI 1,2,3 or equivalent.
Wiki: Syllabus: | 2. Secure Routing | | Reviews, general papers Reaktiv (on demand) [Hu02c] Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Yih-Chun Hu, Adrian Perrig, David B. Johnson, http://citeseer.ist.psu.edu/531013.html http://www.ece.cmu.edu/~adrian/projects/secure-routing/ariadne.pdf [Kong03a] An Anonymous On Demand Routing Protocol with Untraceable Routes for Mobile Ad-hoc Networks, Jiejun Kong, Xiaoyan Hong, Mario Gerla, http://www.cs.ucla.edu/~jkong/publications/CSD-TR030020.pdf [Pap02a] The Secure Routing Protocol (SRP) for Ad Hoc Networks, Panagiotis Papadimitratos, Zygmunt J. Haas, Prince Samar, http://www.people.cornell.edu/pages/pp59/Docs/draft-secure_routing_for_ad_hoc_networks-00.pdf [San02] A Secure Routing Protocol for Ad Hoc Networks, Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer, http://www.ece.cmu.edu/~adrian/731-sp05/readings/SDLSB-aran.pdf [Yi01a] Security-aware Routing Protocol for Wireless Ad Hoc Networks, Seung Yi, Prasad Naldurg, Robin Kravets, http://www-sal.cs.uiuc.edu/~rhk/pubs/SCI2002.pdf [ZhaYa05] Anonymous Communications in Mobile Ad Hoc Networks, Yanchao Zhang, Wei Liu, Wenjing Lou, http://ece.wpi.edu/~wjlou/publication/INFOCOM05_Zhang.pdf
Protocol extensions
|
| 3. Key Management, Authentication | | Distributed Keymanagement [Kong01] Providing robust and ubiquitous security support for mobile ad-hoc networks, Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, http://www.cs.ucla.edu/~jkong/publications/ICNP01-jkong.pdf [Leh03] Shared RSA Key Generation in a Mobile Ad Hoc Network, Brian Lehane , Linda Doyle , Donal O'Mahony, http://ntrg.cs.tcd.ie/lehaneb/papers/milcom03.pdf [Schi04] Key Management and Distribution for Threshold Cryptography Schemes, Fabian Schilcher, http://www13.informatik.tu-muenchen.de/lehre/seminare/WS0304/UB-hs/FabianSchilcher_KeyManagement_report.pdf [Yi01b] Practical PKI for Ad Hoc Wireless Networks, Seung Yi, Robin Kravets, http://ncstrl.cs.uiuc.edu/Dienst/Repository/2.0/Body/ncstrl.uiuc_cs/UIUCDCS-R-2002-2273/pdf [Yi02b] Key Management for Heterogeneous Ad Hoc Wireless Networks, Seung Yi, Robin Kravets, http://www-sal.cs.uiuc.edu/~rhk/pubs/tr-2290-1734.pdf [Yi03a] MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks, Seung Yi, Robin Kravets, http://middleware.internet2.edu/pki03/presentations/06.pdf [ZhoL99] Securing Ad Hoc Networks, Lidong Zhou, Zygmunt J. Haas, http://www.cs.cornell.edu/home/ldzhou/adhoc.pdf [ZhoL00] COCA: A Secure Distributed Online Certification Authority, Lidong Zhou, Fred B. Schneider, Robbert van Renesse, http://www.cs.cornell.edu/fbs/publications/cocaTOCS.pdf
Selforganizing Infrastructure (Web of Trust, Small worlds) Resurrecting Duckling Cryptobased Identities Keyestablishment Protocols, Group Keymanagement
|
Presentation assignments: Templates for presentation [Powerpoint], [OOImpress v.2.0] Date | Presenter | Topic | Slides | 24.10.2005 | Wolf Müller | Administrative remarks | [pdf] | 31.10.2005 | Wolf Müller | Introduction | [pdf] | 07.11.2005 | Habib Shakhawat | Attacks: General | [pdf] | 14.11.2005 | Robert Göttsch | Attacks: Active | [pdf] | 21.11.2005 | Stefan Jordan | Attacks: Passive | | 28.11.2005 | canceled | | | 05.12.2005 | Enno Gröper | Secure Routing: Reviews | [pdf] | 12.12.2005 | Lutz Lippke | Secure Routing: Reaktiv | [pdf] | 09.01.2006 | Knut Müller | Key Manegement: Genaral | [pdf] | 16.01.2006 | Marty Rosner | Key Manegement: Distributed | missing | 23.01.2006 | Chris Helbing | Key Manegement: Resurrecting Duckeling | [pdf] | 30.01.2006 | Johannes Fichte | Key Manegement: Cryptobased Identities | [pdf] | 06.02.2006 | Juan Luis Nunez Cabello | Key Manegement: Keyestabishment Protokolls, Group Keys | [pdf] | 13.02.2006 | Stefan Jordan | Attacks: Passive | [pdf] |
Further Readings (Books):
- Ross Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. ISBN 0471389226
- Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition. ISBN 0471117099
| |
|