Security of Wireless Networks and Mobile Devices

Fall 2019

 

 

General Information | Announcements | Course Objectives | Course Topics | Lectures | Required Text and Materials | Class Requirements | Exams

 

 

General Information

Instructor

Sorin Iftene

           Office: C904

           E-mail: siftene@info.uaic.ro

           Tel: (0232) 201531

          Office Hours: every Wednesday from 10:00 to 11:00 or by appointment

Class Time and Location

          Course  – Friday, from 16:00 to 20:00, in C909

            Seminar – Friday, from 18:00 to 20:00, in C909

 

Announcements

 

Course Objectives

This course will present the most important mechanisms dedicated to protect data integrity and confidentiality, access control, authentication, user privacy, quality and continuity of service, in wireless/mobile enviroments.

This course also intends to stimulate students in their own research - improve their ability of extracting, presenting, and discussing results from recent papers on a certain topic and try to extend/improve them.

 

 

 

Course Topics

-      Threats and Risks  in Wireless/Mobile Communications

-      Mobile Ad-Hoc Network Security

-      Cellular Network Security  - 2G (GSM), 3G (UMTS)

-      Wireless Local Area Network Security

-      Wireless Personal Area Network Security (Bluetooth)

-      Cryptography under Resource Constraints (bandwidth, memory, computation, energy constraints)

-      Wireless Sensor Network Security

-      Radio Frequency Identification (RFID) Security

-      Secure Mobile Commerce. Secure Mobile Payments

 

 

 

Lectures

1.    Course Overview. Threats and Risks  in Wireless/Mobile Communications (October 4)

References

-      Chapter 1 of  Security of Mobile Communications  (by N. Boudriga)

                         Seminar (October 4) – Threshold Cryptography with Applications in Security of Mobile Ad-Hoc Networks (Part I – Secret Sharing Background)- Chapter 2 of  Secret Sharing Schemes with Applications in Security Protocols (S. Iftene)

 

2.  Secure Routing for Mobile Ad hoc Networks (I) (October 11) – Security Problems in Ad-Hoc Routing, Secure Protocols for Ad-Hoc Routing (SEAD, ARAN, SRP)

References

-      Patroklos G. Argyroudis and Donal O’Mahony.  Secure Routing for Mobile Ad Hoc Networks. IEEE  Communications Surveys & Tutorials, Volume 7,  Issue 3, Pages 2 – 21, 2005

-      Y.-C. Hu, D.B. Johnson, A. Perrig. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 1, 175–192, 2003

-      Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer. A Secure Routing Protocol for Ad Hoc Networks. In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP '02). IEEE Computer Society, Washington, DC, USA, 78-89, 2002

-      P. Papadimitratos and Z. J. Haas.  Secure Routing for Mobile Ad hoc Networks. In Proceedings of Communication Networks and Distributed Systems, Modeling and Simulation Conf. (CNDS’02), San Antonio, Texas, pp. 27–31, 2002

                        Seminar (October 11) – Threshold Cryptography with Applications in Security of Mobile Ad-Hoc Networks (Part II – Threshold Cryptography and Its Applications in Security of Mobile Ad-Hoc Networks)

References

-      Section 4.2 of  Secret Sharing Schemes with Applications in Security Protocols (S. Iftene)

-      H. Luo, J. Kong,  P. Zerfos, S. Lu, and L. Zhang. URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on  Networking, Volume 12, Number 6, pp. 1049-1063 (2004)

-      S. Jarecki and N. Saxena. On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol. IEEE Transactions on Information Forensics and Security, Volume 5, Issue 4, pp. 739 - 749 (2010)

 

3. Secure Routing for Mobile Ad hoc Networks (II) (October 18) – ARIADNE with TESLA, SAODV

References

-      Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. The TESLA Broadcast Authentication Protocol. RSA Laboratories CryptoBytes Volume 5, No. 2, Summer / Fall 2002

-      Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks. In Proceedings of the 8th ACM Int’l. Conf. Mobile Comp. and Net. (Mobicom’’02), Atlanta, Georgia,  pp. 12–23, 2002

-      Manel Guerrero Zapata and N. Asokan. Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security (WiSE '02). ACM, New York, NY, USA, 1-10, 2002

Supplementary Reading

 L. Buttyan and I. Vajda. Towards provable security for ad hoc routing protocols. In SASN ’04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 94–105, 2004

           Seminar (October 18) –  Anonymous Routing Protocols for Mobile Ad hoc Networks

References

-      Sections 6.4, 6.5 of  Cryptographic Algorithms and Protocols for Security and Privacy in Ad Hoc Networks, S. Seys' PhD thesis, Katholieke Universiteit Leuven, 2006

 

4. Security of Cellular Networks (October 25)

References

-      Chapters 5, 6 of  Security of Mobile Communications  (by N. Boudriga)

Supplementary Reading -  Ulrike Meyer, Susanne Wetzel. A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on Wireless security (WiSe '04). pp. 90-97 (2004)

                        Seminar (October 25) –  Student Presentations

 

5. WLAN Security (I) - Wired Equivalent Privacy (November 1)

References

-      Chapter 7 of  Security of Mobile Communications  (by N. Boudriga)

                     Seminar (November 1) – Student Presentations

 

6. WLAN Security (II) - IEEE 802.11i: Enhanced Security (November 8)

References

-      NIST Special Publications - SP 800-97 - Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i (Section 4)

Supplementary Reading – M. Beck and E. Tews. Practical attacks against WEP and WPA. In Proceedings of the Second ACM Conference on Wireless Network Security (WiSec '09), p. 79-86 (2009)

                         Seminar (November 8) – Student Presentations

 

                        Midterm Exam (November 15)

 

Required Text and Materials

- W. Osterhage. Wireless Network Security (second edition). CRC Press, Taylor & Francis Group, 2018

- N. Boudriga. Security of Mobile Communications. CRC Press, Taylor & Francis Group, 2009

- H. Chaouchi, M. Laurent-Maknavicius. Wireless and Mobile Networks Security. Wiley, 2009

- NIST Federal Information Processing Standards

 

  Most of the course and seminar material will be also based on conference or journal articles which will be announced in advance.

 

 

Class Requirements

 

Class participation:  Students are expected to come prepared and actively participate in the courses and seminars.

 

Class presentation: Every student is required to give two class presentations (roughly 40 minutes each) on a selected topic.

 

The course grade will be determined as follows:

presentation of two reports on a selected topic (during seminars):                                    40% (20%+20%)

midterm exam:                                                                                                               30%

final exam:                                                                                                                     30%

(You have to collect at least 50% points from each presentation, and at least 50% points from each exam)

 

 

Exams

- midterm exam            –  November 15, 16:00-18:00, C909

- re-evaluation midterm exam            –  TBA

- final exam                  –  TBA

- re-evaluation exam      –  TBA