ece 6900 special problems in electrical engineering
play

ECE 6900 Special Problems in Electrical Engineering: Security and - PowerPoint PPT Presentation

ECE 6900 Special Problems in Electrical Engineering: Security and privacy preservation for wireless networks Chapter 0: Important information Dr. Mohamed Mahmoud http://iweb.tntech.edu/mmahmoud/ mmahmoud@tntech.edu Instructor: Dr.


  1. ECE 6900 – Special Problems in Electrical Engineering: Security and privacy preservation for wireless networks Chapter 0: Important information Dr. Mohamed Mahmoud http://iweb.tntech.edu/mmahmoud/ mmahmoud@tntech.edu

  2. Instructor: Dr. Mohamed M. E. A. Mahmoud Office: Brown Hall - 331 lab: Brown Hall – 324 E-mail: mmahmoud@tntech.edu Webpage: http: / / www.cae.tntech.edu/ ~ mmahmoud/ Course w ebsite: Any course announcements or material will be included on the web site at http://www.cae.tntech.edu/~mmahmoud/teaching_files/grad/E CE6900/F16/ECE6900.html Frequently check this site for updates. Office hours: TTh 12 to 1: 20 and by email. Do not hesitate to contact m e if you have any question or problem 0 - 1

  3. Feedback I strongly welcome feedback on how to improve teaching this course. Feel free to talk to me or email me. 0 - 2

  4. Course Goals - Introduce the students to the security and privacy concepts, different wireless networks and their applications. - Introduce the students to the potential security/ privacy research problems in wireless networks and the proposed techniques. Course Outline:- Chapter 1: Introduction to Communication Networks Chapter 2: Introduction to Cryptography and Security Chapter 3: Wireless networks: architecture and applications Chapter 4: Current research directions: security/ privacy violation attacks and solutions 0 - 3

  5. Course Textbook No textbook is required. The lecture materials will be derived from a number of background papers and textbooks. 1- Alfred Menezes, “handbook of applied cryptography”, free chapters can be downloaded from http: / / cacr.uwaterloo.ca/ hac/ 2- Network Security: Private Communication in a Public World (2nd Edition), by Charlie Kaufman, Radia Perlman, and Mike Speciner, Prentice Hall, ISBN-10: 0130460192. 3- Security for Wireless Ad Hoc Networks By Farooq Anjum, Petros Mouchtaris Published by Wiley-Interscience, 2007 4- Various reading material and research papers will be given. 0 - 4

  6. Course Evaluation 1 - Project: literature survey report. To be done individually. 3 0 % of the final grade. 2 - Presentations/ Assignm ents: 3 0 % of the final grade. 3 - Midterm : The midterm examination will count for 1 0 % of the final grade. OPEN book, notes, laptops, etc. 4 - Final exam : The final examination will count for 3 0 % of the final grade. OPEN book, notes, laptops, etc. 0 - 5

  7. Expectations - The literature survey and the presentations are 6 0 % of the final grade. Do not assum e that you w ill get m ost of this grade even if you do poor w ork. W rong assum ption - Do not assume that you will pass without enough work because I’m your advisor. W rong assum ption - For the survey and the presentations, you may need to meet me to get guidance. Understand well my expectations. - Class participation: Your input is needed for good discussion - Fully understand the slides, lectures, and assignments - Be on time (if you are late enter the class quiet) - Focus in classes and take good notes 0 - 6

  8. Expectations - Get help early if you need. I t is your responsibility to seek help from the instructor. - Begin studying the material in the same day it is presented – do not accum ulate lectures – the number of slides may be large – each lecture builds on the previous ones. 0 - 7

  9. Questions Mohamed Mahmoud

Recommend


More recommend