ECE 6900 Special Problems in Electrical Engineering: Security and - - PowerPoint PPT Presentation

ece 6900 special problems in electrical engineering
SMART_READER_LITE
LIVE PREVIEW

ECE 6900 Special Problems in Electrical Engineering: Security and - - PowerPoint PPT Presentation

ECE 6900 Special Problems in Electrical Engineering: Security and privacy preservation for wireless networks Chapter 0: Important information Dr. Mohamed Mahmoud http://iweb.tntech.edu/mmahmoud/ mmahmoud@tntech.edu Instructor: Dr.


slide-1
SLIDE 1

ECE 6900 – Special Problems in Electrical Engineering: Security and privacy preservation for wireless networks

  • Dr. Mohamed Mahmoud

http://iweb.tntech.edu/mmahmoud/ mmahmoud@tntech.edu

Chapter 0: Important information

slide-2
SLIDE 2

Instructor: Dr. Mohamed M. E. A. Mahmoud Office: Brown Hall - 331 lab: Brown Hall – 324 E-mail: mmahmoud@tntech.edu Webpage: http: / / www.cae.tntech.edu/ ~ mmahmoud/

0 - 1

Course w ebsite: Any course announcements or material will be included on the web site at

http://www.cae.tntech.edu/~mmahmoud/teaching_files/grad/E CE6900/F16/ECE6900.html

Frequently check this site for updates. Office hours: TTh 12 to 1: 20 and by email. Do not hesitate to contact m e if you have any question or problem

slide-3
SLIDE 3

I strongly welcome feedback on how to improve teaching this

  • course. Feel free to talk to me or email me.

Feedback

0 - 2

slide-4
SLIDE 4

Course Goals

  • Introduce the students to the security and privacy concepts,

different wireless networks and their applications.

  • Introduce

the students to the potential security/ privacy research problems in wireless networks and the proposed techniques. Course Outline:- Chapter 1: Introduction to Communication Networks Chapter 2: Introduction to Cryptography and Security Chapter 3: Wireless networks: architecture and applications Chapter 4: Current research directions: security/ privacy violation attacks and solutions

0 - 3

slide-5
SLIDE 5

Course Textbook

No textbook is required. The lecture materials will be derived from a number of background papers and textbooks. 1- Alfred Menezes, “handbook of applied cryptography”, free chapters can be downloaded from http: / / cacr.uwaterloo.ca/ hac/ 2- Network Security: Private Communication in a Public World (2nd Edition), by Charlie Kaufman, Radia Perlman, and Mike Speciner, Prentice Hall, ISBN-10: 0130460192. 3- Security for Wireless Ad Hoc Networks By Farooq Anjum, Petros Mouchtaris Published by Wiley-Interscience, 2007 4- Various reading material and research papers will be given.

0 - 4

slide-6
SLIDE 6

Course Evaluation

1 - Project: literature survey report. To be done individually. 3 0 % of the final grade. 2 - Presentations/ Assignm ents: 3 0 % of the final grade. 3 - Midterm : The midterm examination will count for 1 0 % of the final grade. OPEN book, notes, laptops, etc. 4 - Final exam : The final examination will count for 3 0 % of the final grade. OPEN book, notes, laptops, etc.

0 - 5

slide-7
SLIDE 7

Expectations

  • The literature survey and the presentations are 6 0 %
  • f the

final grade. Do not assum e that you w ill get m ost of this grade even if you do poor w ork. W rong assum ption

  • Do not

assume that you will pass without enough work because I’m your advisor. W rong assum ption

  • For the survey and the presentations, you may need to meet

me to get guidance. Understand well my expectations.

  • Class participation: Your input is needed for good discussion
  • Fully understand the slides, lectures, and assignments
  • Be on time (if you are late enter the class quiet)
  • Focus in classes and take good notes

0 - 6

slide-8
SLIDE 8

Expectations

  • Get help early if you need. I t is your responsibility to seek

help from the instructor.

  • Begin studying the material in the same day it is presented –

do not accum ulate lectures – the number of slides may be large – each lecture builds on the previous ones.

0 - 7

slide-9
SLIDE 9

Questions

Mohamed Mahmoud