CS 553   (Spring 2004)

Advanced Computer Networks

Instructor

Hamdy Soliman - hss@nmt.edu 
Office: Speare 147
Phone: 835-5170
Class place/time: Jonesa 106, 14.00-15.15

Textbook

Computer Networking: A Top-Down Approach Featuring the Internet (second Edition)
By J.F.Kurose and K.W.Ross, Publisher: Eddison Wesley

Exams

Grading

Mid Term Exam (closed book and notes) : 40%
Group Presentations and Final Report : 50%
Indivudual Presentation and Class Participation : 10%

Note: Grades may vary as the system progresses.

Topics to be covered (not necessarily in that order)

Notice

During the first half of the semester, the instructor presents the above topics. The students are entitled to form groups and collaborate to choose a subject (has to be approved by the instructor). The group has to perform an extensive research about the subject(related to the above topics), and prepare 5 presentations, each of half-hour duration. The final presentation includes the recent work done in the chosen-subject area (from the litterature), along with any obtained results/analysis and the group's final conclusion. A final project report has to be submitted to the instructor before the end of the semester.

References

  1. Network Security Essentials: Applications and Standards

  2. Computer Networks

  3. Computer Networks: A Systems Approach, 3rd edition

  4. Communication Networks: Fundamental Concepts and Key Architecture

  5. Internetworking with TCP/IP: Principles, Protocols and Architectures, 4th edition, Volume 1, 2, and 3

Useful Papers

  1. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks
  2. On Communication Security in Wireless Ad-Hoc Sensor Networks
  3. ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-based PDAs
  4. Secure Aggregation for Wireless Networks
  5. A Method for Security Enhancements in AODV Protocol
  6. Toward a Security Architecture for Smart Messages: Challenges, Solutions, and Open Issues
  7. Securing Authentication and Privacy in Ad hoc Partitioned Networks
  8. Toward Secure Key Distribution in Truly Ad-Hoc Networks
  9. Thirty Years Later: Lessons from the Multics Security Evaluation
  10. Key Management for Heterogeneous Ad Hoc Wireless Networks
  11. A Client-based Handoff Mechanism for Mobile IPv6Wireless Networks
  12. A Secure Routing Protocol for Ad Hoc Networks
  13. Securing Mobile Appliances: New Challenges for the System Designer
  14. Self-securing Ad HocWireless Networks
  15. Vulnerability Assessment in Wireless Networks
  16. A Low-Energy Key Management Protocol for Wireless Sensor Networks