kaist cs710 컴퓨터구조 특강 무선 센서네트워크 응용 및 보안 syllabus 2008. 9. 2...
TRANSCRIPT
KAIST
CS710 CS710 컴퓨터구조 특강컴퓨터구조 특강무선 센서네트워크 응용 및 보안무선 센서네트워크 응용 및 보안
Syllabus
2008. 9. 2
Network & Security Lab.
CS710 컴퓨터구조 특강 – 무선 센서네트워크 응용 및 보안
Class outlineClass outline
Goal
To understand the state of the art technologies in Wireless
Sensor Networks and Web security
Topics
Wireless Sensor Network
MSNs : Mobile Sensor Networks
WSANs : Wireless Sensor and Actor Networks
UW-ASN : Underwater Acoustic Sensor Networks
Wireless Network Security Issues
Web Security Issues
22 / 11 / 11
Class outlineClass outline
Class Hour and Classroom
TUE&THU 1:00-2:30 pm , #2445 ( 제 4 강의실 )
Course description
Key papers for each subject (Scheduled at random)
http://nslab.kaist.ac.kr/courses/2008/cs710
Two presentation for each person, 2 or 3 presentation each class
Presentation material must be delivered at least a day ahead the
class by e-mail to TA
Submit critique before starting the class
Problem definition, Key idea, Weak point, Improving point, etc.
Subject of email : [CS710_critique], File name :
CS710_080902_20075353.doc
33 / 11 / 11CS710 컴퓨터구조 특강 – 무선 센서네트워크 응용 및 보안
Class outlineClass outline
Term project – Option12 persons for one team, Research using experimental equipmentsExperimental equipments
Sensor nodesMICAz Mote 12 nodesCricket2 10 nodes
ER1 Mobile Robot 4 Units
44 / 11 / 11CS710 컴퓨터구조 특강 – 무선 센서네트워크 응용 및 보안
Class outlineClass outline
Experiment examples
Performance study of IEEE 802.11 for wireless multi-hop
environment
Implementation study of sensor network routing protocols
Comparison between scheduled and contention based MAC for
sensor network
Energy-efficiency of data aggregation in sensor networks
Design and implementation study of security layer framework for
sensor network
Performance comparison of secure routing protocols
Implementation study of key management schemes
55 / 11 / 11CS710 컴퓨터구조 특강 – 무선 센서네트워크 응용 및 보안
Class outlineClass outline
Research topics for individual paper writing – Option2Wireless Sensor Networks
Energy-efficient routing control, clustering and topology controlPositioning and localization, data aggregation algorithms
Wireless Network SecurityDistributed(Central) and multi-hop authentication, Efficient key management
Web Security
The Method for resolving Client-Side Security Issues
Project Proposal Due : October 31 2008
66 / 11 / 11CS710 컴퓨터구조 특강 – 무선 센서네트워크 응용 및 보안
Class outlineClass outline
Grading
No exam
Critiques
Presentations (Peer Review)
Term project
Teaching assistant
홍재영 (jyhong { } nslab.kaist.ac.krⓐ )
77 / 11 / 11CS710 컴퓨터구조 특강 – 무선 센서네트워크 응용 및 보안
Mobile Sensor NetworksMobile Sensor Networks
Sensors may be enhanced with mobility
Mobile Sensor may be more powerful and can re-charge
themselves automatically
Robot area, CarTel, Surveillance ecosystem…
Resilient to failures, Reactive to events, Support disparate missions
Research Directions on Mobile Sensor Networks
Improve network topology, WSN deployment, WSN fault diagnosis
Enhance sensing and routing in WSN
Applications
88 / 11 / 11CS710 컴퓨터구조 특강 – 무선 센서네트워크 응용 및 보안
Wireless Sensor and Actor Wireless Sensor and Actor NetworksNetworks
WSAN unique characteristicsReal-time requirement
Rapid respond to sensor input
Coordination
In order to make decisions on the most appropriate action
Sensor-actor and actor-actor coordination may occur
Example
Fire extinguisher system
Difference from WSNActor exists
Complex coordination
WSN is not be well-suited for WSAN
99 / 11 / 11CS710 컴퓨터구조 특강 – 무선 센서네트워크 응용 및 보안
Underwater Wireless Sensor Underwater Wireless Sensor NetworksNetworks
Real-time, fine grained sampling of the ocean environment
Limited range-dependent bandwidth and attenuation, extensive time-varying multi-path propagation, and low speed of sound propagation in water resulting in long propagation delays
A unique feature of underwater networks
Nodes can passively move due to water currents and dispersion
1010 / 11 / 11CS710 컴퓨터구조 특강 – 무선 센서네트워크 응용 및 보안
Web Security IssuesWeb Security Issues
The attack of targeting the web clients is to be increasing
The attacks collect the user privacy information and use the his computing resources
Existing prevention methods in server-side can not prevent it.
Phishing , Spyware , XSS Attacks
The Method for resolving Client-Side Security IssuesAnti-Phishing Approaches
Phishing Detection, Authentication Method for web environments
Anti-Spyware ApproachesSpyware detection
The Novel Browser Security ModelTo adjust Security Policy in user’s browser
CS710 컴퓨터구조 특강 – 무선 센서네트워크 응용 및 보안 1111 / 11 / 11