[Note: The most recent updates highlighted]

 

CS 6030: Advanced Computer and Information Security (ACIS) — Fall 2007

Prof. Leszek Lilien

Department of Computer Science

Western Michigan University

 

Slides and Announcements

 

Class Web Pages

Main: index.html

Lecture slides and announcements (this page): slides+announcements.html

 

 

Slides and Announcements

 

------------------------------------------------  Week 1 ------------------------------------------------ 

 Lecture Section 1:   Introduction and Overview

Section 1a (9/4):          Overview of  Syllabus and Slides and Announcements

Section 1b (9/4):          Overview of main textbook (local link to avoid content changes)

Section 1c (9/4):   Overview of Table of Contents for the main textbook (redundant link)

Section 1d (9/4 – 9/6):             Slides — Main textbook overview: “Security and Cooperation in Wireless Networks. Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing” (PPT, PDF)

 

------------------------------------------------  Week 2 ------------------------------------------------ 

Section 1e (9/9 - emailed): Students’ Survey

Section 1f (9/11):         Basics of oppnets with examples of oppnet applications (PPT, PDF–animation does not work in PDF)

 

  Lecture Section 2:   Information on Course Projects and Textbook Presentations

Section 2a (9/11 & 9/13): List of course projects

Section 2b (9/13):        Project Information – Part 1

Section 2c (9/13):        Schedule of Students’ Textbook Presentations

 

------------------------------------------------  Week 3 ------------------------------------------------ 

Lecture Section 3: Introduction to Oppnets

Section 3a (9/18): Introduction to oppnet structure and activities (PPT, PDF)

 

Lecture Section 4: Main Textbook – Introduction by Instructor (L. Buttyán and J.-P. Hubaux, Security and Cooperation in Wireless Networks. Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing)

Section 4a (9/18):        Chapter 1: Existing Wireless Neworks

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenter (PPT, PDF)

Section 4b (9/20):        Chapter 2: New Wireless Networks and New Challenges

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenter (PPT, PDF)

 

 

------------------------------------------------  Week 4 ------------------------------------------------ 

Section 4c (9/25):        Chapter 3: Trust

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenter (PPT, PDF)

 

      Lecture Section 5: Short Initial Group Project Presentations by Students

Section 5a (9/27):        Part 1 of Short Initial Group Project Presentations

 

------------------------------------------------  Week 5 ------------------------------------------------ 

Section 5b (10/2):        Part 2 of Short Initial Group Project Presentation

 

Lecture Section 6: Main Textbook Presentations by Students (L. Buttyán and J.-P. Hubaux, Security and Cooperation in Wireless Networks. Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing)

Section 6a (10/4):        Chapter 4: Naming and Addressing

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

 

 

------------------------------------------------  Week 6 ------------------------------------------------ 

Section 6b (10/9):        cont. Chapter 4

Chapter 5: Establishment of Security Associations

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

Section 6c (10/11):      cont. Chapter 5

 

------------------------------------------------  Week 7 ------------------------------------------------ 

Section 6d (10/16):      Chapter 6: Securing Neighbor Discovery

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

Section 6e (10/18):      cont. Chapter 6

                                    Chapter 7: Secure Routing in Multi-Hop Wireless Networks – part 1

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

 

------------------------------------------------  Week 8 ------------------------------------------------ 

Section 6f (10/23):       cont. Chapter 7 – part 1

Section 6g (10/25):      Chapter 7: Secure Routing in Multi-Hop Wireless Networks – part 2

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

 

------------------------------------------------  Week 9 ------------------------------------------------ 

Section 6h (10/30):      cont. Chapter 7 - part 2

Chapter 8: Privacy Protection

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

Section 6i (11/1):         cont. Chapter 8

 

------------------------------------------------  Week 10 ------------------------------------------------ 

Section 6j (11/6):         Chapter 9: Selfish Behaviour at the MAC layer of CSMA/CA – part 1

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

Section 6k (11/8):        cont. Chapter 9 – part 1

Chapter 9: Selfish Behaviour at the MAC layer of CSMA/CA – part 2

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

 

------------------------------------------------  Week 11 ------------------------------------------------ 

Section 6l (11/13):       cont. Chapter 9 – part 2

Section 6m (11/15):     Chapter 10: Selfishness in Packet Forwarding

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

 

------------------------------------------------  Week 12 ------------------------------------------------ 

Section 6n (11/20):      cont. Chapter 10

Chapter 11: Cooperation among Operators

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

11/22 – no classes – Thanksgiving break

 

------------------------------------------------  Week 13 ------------------------------------------------ 

 

Section 6o (11/27):      cont. Chapter 11

Section 6p (11/29):      Chapter 12: Secure Protocols for Behavior Enforcement (12 pp. => only 1 lecture period)

                                                Original textbook slides (PPT, PDF)

                                                Slides modified by the presenters (PPT, PDF)

 

------------------------------------------------  Week 14 ------------------------------------------------ 

Lecture Section 7: Short Final Group Project Presentations by Students

Section 7a (12/4):        Part 1 of Short Final Group Project Presentations

Section 7b (12/6):        Part 2 of Short Final Group Project Presentation

 

 

 

------------------------------------------------  Week 15 ------------------------------------------------ 

Final Exams

 

 

 

© 2007 by Leszek T. Lilien                                                               Last updated on 9/14/07