CSE 5388 Wireless Security (Fall 2015)
|Dr. Donggang Liu
Office: ERB 555
Office hours: Tuesdays & Thursdays 1:30PM - 3:30PM
Voice: 817-272-0741; Fax: 817-272-3784
Email: dliu (at) uta (dot) edu
Teaching Assistant: TBA
Sumesh Nellemakkal Balan(sumesh.nellemakkalbalan at mavs.uta.edu)
Class Time and Location: TuTh 3:30PM - 4:50PM (NH 112)
- No textbook. All slides are based on recent papers.
- CSE 3320: Operating Systems
- CSE 4344: Computer Networks
- Introduction to wireless networking
- Attacks on wireless networking
- physical layer: jamming
- mac layer: jamming, selfish behavior
- network layer: routing, selfish behavior
- Security mechanisms
jamming resistant communication
- security for MAC layer protocol
- secure routing
- setup security parameters
- Case study
- wireless sensor network security
- wireless mesh network security
- RFID security
- android security, Trustzone technology
- Class participation (20%)
- Paper summary (40%)
- Paper presentation (40%)
Note on Assignments:
- Introduction: pdf
- Background: pdf
- Attacks: pdf
- Symmetricy key cryptography (Sep. 17)
- Public key crypgtography
- Hash function
- Spreading spectrum
- Oct 6: DSR routing
- Oct 8: AODV routing
- Oct 13: Mobile IP
- Oct 15: defense techniques: pdf (by the instructor)
- Oct 20: defense techniques pdf(by the Instructor)
- Oct 22: papers 1 and 2
- Oct 27: papers 3 and 4
- Oct 29: papers 5 and 6
- Nov 3: papers 7 and 8
- Nov 5: papers 9 and 10
- Nov 10: papers 11 and 12
- Nov 12: papers 13 and 14
- Nov 17: papers 15 and 16
- Nov 19: papers 17 and 18
- Nov 24: papers 19 and 20
- Dec 01: papers 21 and 22
- Dec 03: papers 23 and 24
- Dec 08: papers 25 and 26
- Dec 10: papers 27,28,29,30,31,32,33,34,35,37,38,39,40 in my office
Assignments and Lab Exercises:
- You must use text editor (e.g. MS Word) to complete your homework.
- Handwritten submissions are not acceptable.
- Topics for the first presentation txt
- Paper list txt
- (due on Dec 1st 11:59PM) Paper summary instruction: pdf
- Paper assignment file
- Course Policies:
- Assignment and project deadlines will be firm.
- Late assignments will be accepted with a 10% reduction in
grade for each day they are late by.
- All assignments must be turned in before the start of class
on the due date.
- Students are responsible for checking this web site
frequently for course related material and announcements. This
site will be the primary form of communication for the course
unless otherwise specified.
- Please include "CSE 5388 Wireless Security" in the Subject line of all e-mail correspondence.
- No make up exams or assignments will be given.
- You may select any language/system to implement your
labs. In general, there will be more support for C/C++/VB and
Microsoft's Visual Studio environments.
- All exams are closed book.
- The instructor reserves the right to modify the policies, calendar, assignments, point values and due dates.
- Faculty are required by law to provide "reasonable
accommodation" to students with disabilities, so as not to
discriminate because of that disability. Student responsibility
primarily rests with informing faculty at the beginning of the
semester and in providing authorized documentation through
designated administrative channels.
- Taping of lectures:
You may tape the lectures if you wish. Students who's native
language is not English are strongly encouraged to tape the
lectures. Much of the material in this course will be new to many
of you and being able to review my comments will help pinpoint the
important issues in the book.
- Academic Dishonesty:
It is the philosophy of The University of Texas at Arlington that
academic dishonesty is completely unacceptable and will not be
tolerated. Anyone involved in academic dishonesty will be
disciplined in accordance with University regulations and
procedures, possibly including suspension or expulsion from the
University. "Scholastic dishonesty includes but is not limited to
cheating, plagiarism, collusion, the submission for credit of any
work or materials that are attributable in whole or in part to
another person, taking an examination for another person, any act
designed to give unfair advantage to a student or the attempt to
commit such acts." See:
www-ais2.uta.edu/policy/hop2/2-200.shtml. Read section 2-202.A.6.
- All student labs may be automatically compared with other student labs for similarity:
A high level of similarity will result in a penalty for all
students involved since we have no way of knowing who originated
code that is copied. It is generally permissible for you to use
code from the www or from text books. If you use code from such
sources then you should include in your program comments and
write-up a reference to the material. This will be the only
exception to the assumption of collusion/plagiarism. In this class
we will have no tolerance for cheating. At a minimum it will
result in a grade of -100 on the test or assignment. A grade of
zero is no punishment for wrongdoing since a grade of zero is what
you would receive for doing nothing at all. In order to ensure
fairness to all students, exams will be proctored and possibly