CS 410/510: Advanced Sensor Networks (Spring 2009)
CS 410/510: Advanced Sensor Networks (Spring 2009)
Instructor: Nirupama Bulusu
Venue and Time: Friday 9 - 12:40 am, FAB 150
Office Hours: Fridays 2-3 pm
Overview
This course focuses on the security and privacy challenges for sensor networks and urban sensing systems. The course consists of two primary components.
- Readings:
We will be reading recent research papers on security and privacy in sensor
networks. The class will be divided into a number of paper groups based on topic. Each student is expected to present and lead a discussion of some of the papers under a topic.
We will assign the papers to each student on the first day of class.
You must prepare slides for your presentation. Your presentation should provide both a detailed overview of the paper as well as a critique and topics for
further discussion.
All students are required to read all papers and
submit hard copy conference-style critiques of at least 2 papers discussed in class each week.
The paper critiques are due at the beginning of the class .
- Project:
Each student will work on a quarter-long research project of his/her choosing.
You can work individually or in teams, however the work accomplished is
expected to be proportional to the number of people in a team. A list of
project ideas will be posted to the class mailing list.
You are expected to select a project topic in consultation with the instructor and
submit a project proposal at the end of Week 3.
Students are expected to report on their progress bi-weekly during class. At the end of the term, you are expected to do a presentation of your research
project on the last day of class (June 5th), and submit an 8-page conference
style research paper on your work (due June 12th 9am). You can use the
ACM SIG Proceedings Template to format your paper.
Grading Criteria
Your grades will be calculated on the basis of
- Paper Critiques - 20%
- Paper Presentation - 15%
- Class Participation - 10%
- Project - 55%
Schedule and Readings
- 04/03: Security Threats in Sensor Networks
- Security in Wireless Sensor Networks, A. Perrig, J. Stankovic, and D. Wagner, invited paper, Communications of the ACM, Volume 47, Number 6, June 2004, pp. 53-57. PDF
- Anthony Wood, John A. Stankovic, "Denial of Service in Sensor Networks", IEEE Computer, 35(10):54-62, October 2002.
PDF
- 04/10: Cryptography Review, Key Distribution
- Laurent Eschenauer, Virgil D. Gligor: A key-management scheme for distributed sensor networks. ACM Conference on Computer and Communications Security 2002: 41-47. PostScript
- Donggang Liu, Peng Ning, "Improving Key Pre-distribution with Deployment Knowledge in Static Sensor Networks", ACM Transactions on Sensor Networks (TOSN), Vol. 1, No. 2, pages 204-239, November 2005.
PDF
- 04/17: System Implementation
- [SPINS] Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. E. 2002. SPINS: security protocols for sensor networks. Wirel. Netw. 8, 5 (Sep. 2002), 521-534. PDF
- [TinySec] Karlof, C., Sastry, N., and Wagner, D. 2004. TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international Conference on Embedded Networked Sensor Systems (Baltimore, MD, USA, November 03 - 05, 2004). SenSys '04. ACM, New York, NY, 162-175.
PDF
- [TinyECC] An Liu, Peng Ning, "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," in Proceedings of the 7th Internationâal Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track, pages 245--256, April 2008.
PDF
â
- [MiniSec] Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil Gligor, MiniSec: A Secure Sensor Network Communication Architecture, In Proceedings of Sixth International Conference on Information Processing in Sensor Networks (IPSN), Cambridge, Massachusetts, April 2007.
PDF
- 04/24: Secure Communications
- [TimingChannels] W. Xu, W. Trappe, Y. Zhang, Anti-Jamming Timing Channels for Wireless Networks, to appear in the 1st ACM Conference on Wireless Security (WiSec), 2008. PDF
- [DialogCodes] Dialog Codes for Secure Wireless Communications,
Anish Arora and Lifeng Sang,
ACM/IEEE IPSN , San Francisco, April 2009. PDF
- 04/24: Secure and Intrusion-tolerant Routing
- [INSENS] J. Deng, R. Han, S. Mishra, "INSENS: Intrusion-Tolerant Routing For Wireless Sensor Networks," Elsevier Journal on Computer Communications, Special Issue on Dependable Wireless Sensor Networks, 2005, vol 29, issue 2, pp. 216-230.
(PDF)
- [ARIADNE] Hu, Y., Perrig, A., and Johnson, D. B. 2005. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11, 1-2 (Jan. 2005), 21-38.
(PDF)
- 05/01: Secure Localization and Time Synchronization
- [SERLOC] Loukas Lazos and Radha Poovendran, SeRLoc: Robust Localization for Wireless Sensor Networks, ACM Transactions on Sensor Networks, Vol. 1, No. 1, pp. 73-100, August 2005. PDF
- [TimeSynch] Ganeriwal, S., Secure Time Synchronization in Sensor Networks, Proceedings of the 4th ACM Workshop on Wireless Security (Cologne, Germany, September 02 - 02, 2005). WiSe '05. ACM, New York, NY, 97-106.
PDF
- 05/01: Secure Code and Data Dissemination
- [SIA] Chan, H., Perrig, A., Przydatek, B., and Song, D. 2007. SIA: Secure information aggregation in sensor networks. J. Comput. Secur. 15, 1 (Jan. 2007), 69-102. PDF
- [Seluge] An Liu, Peng Ning, Cliff Wang, "Lightweight Remote Image
Management for Secure Code Dissemination in Wireless Sensor Networks," To appear
in IEEE INFOCOM 2009, April 2009. PDF
- 05/08: Hardware and Software Tamper-Proofing
- [Transient] Boris Danev, Srdjan Capkun,
"Transient-based Identification of Wireless Sensor Nodes",
In Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN) 2009. [PDF]
- [SecFleck] secFleck: A Public Key Technology Platform for Wireless Sensor Networks, Wen Hu, Peter Corke, Wen Chan Shih, Leslie Overs. In Proceeding of 6th European Conference on Wireless Sensor Networks (EWSN 09), February 11th-13th, Cork,
Ireland.
- 05/08, 05/15: Data and Location Integrity
- Naveen Sastry, Umesh Shankar, David Wagner. "Secure verification of Location Claims." ACM Workshop on Wireless Security (WiSe 2003). September 19, 2003.
PDF
- [Reputation] Saurabh Ganeriwal, Laura Balzano, Mani B Srivastava, "Reputation-based Framework for High Integrity Sensor Networks," Accepted for the ACM Transactions on Sensor Networks , November 2007.
PDF
- Y. Zhang, Z. Li, W. Trappe, Power-Modulated Challenge-Response Schemes for Verifying Location Claims, in Proceedings of the IEEE Global Telecommunication Conference (Globecom), pg. 39-43, Nov. 2007.
PDF
- 05/22: Privacy
- P. Kamat, W. Xu, W. Trappe, Y. Zhang, Temporal Privacy in Wireless Sensor Networks, to appear in the Proceedings of the 27th IEEE Int. Conference on Distributed Computing Systems (ICDCS07), 2007.
PDF
- P. Kamat, Y. Zhang, W. Trappe and C. Ozturk, Enhancing Source-Location Privacy in Sensor Network Routing, Proceedings of the 25th IEEE Int. Conference on Distributed Computing Systems (ICDCS05), pg. 599-608, 2005.
PDF
- Can Ferris Bueller Still Have His Day Off? Protecting Privacy in an Era of Wireless Devices, Ben Greenstein, Ramakrishna Gummadi, Jeffrey Pang, Mike Y. Chen, Tadayoshi Kohno, Srinivasan Seshan, and David Wetherall.
HotOS XI: 11th Workshop on Hot Topics in Operating Systems, 2007, San Diego, CA.
PDF
- 05/29: Security, Privacy and Anonymity in Urban Sensing
- Shilton, Katie, Burke, J., Estrin, D., Hansen, M., and Srivastava, M. "Participatory Privacy in Urban Sensing", MODUS 2008 (St. Louis, MO, April 21, 2008).
PDF
- [AnonySense] Apu Kapadia and Nikos Triandopoulos and Cory Cornelius and Dan Peebles and David Kotz. AnonySense: Opportunistic and Privacy-Preserving Context Collection. In Proceedings of the Sixth International Conference on Pervasive Computing (Pervasive), pages 280-297, May, 2008. Springer-Verlag.
PDF
- [Virtual Trip Lines] Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring. Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, Dan Work, Juan-Carlos Herrera, Alexandre Bayen, Murali Annavaram, Quinn Jacobson. ACM Mobisys, 2008. PDF
- [PoolView] PoolView: Stream Privacy in Grassroots Participatory Sensing, R. Ganti, Nam Pham, Yu-En Tsai, and Tarek Abdelzaher, In Proceedings of SenSys 2008, Raleigh, NC.
PDF
- 06/05: Student Project Presentations
Last updated: March 29th, 2009.