ECE 7970 Advanced Cryptography Applications in Emerging Wireless - - PowerPoint PPT Presentation

ece 7970 advanced cryptography applications in emerging
SMART_READER_LITE
LIVE PREVIEW

ECE 7970 Advanced Cryptography Applications in Emerging Wireless - - PowerPoint PPT Presentation

ECE 7970 Advanced Cryptography Applications in Emerging Wireless Networks Chapter 0: Important information Dr. Mohamed Mahmoud http://iweb.tntech.edu/mmahmoud/ mmahmoud@tntech.edu 1 - Course I nform ation I nstructor : Dr. Mohamed M. E.


slide-1
SLIDE 1

ECE 7970 – Advanced Cryptography Applications in Emerging Wireless Networks

  • Dr. Mohamed Mahmoud

http://iweb.tntech.edu/mmahmoud/ mmahmoud@tntech.edu

Chapter 0: Important information

slide-2
SLIDE 2

1 - Course I nform ation

I nstructor: Dr. Mohamed M. E. A. Mahmoud Office: Brown Hall - 331 lab: Brown Hall - 324 E-mail: mmahmoud@tntech.edu Homepage: http: / / www.cae.tntech.edu/ ~ mmahmoud/ Lectures: Mondays and Wednesdays, 12: 20 to 1: 40 in Brwn 208

0 - 1

Office hours: MW 11: 20 to 12: 20. Do not hesitate to contact m e if you have any question

  • r problem
slide-3
SLIDE 3

I strongly welcome feedback on how to improve teaching this

  • course. Feel free to talk to me or email me.

2 - Feedback

0 - 2

slide-4
SLIDE 4

3 - Course Description

0 - 3

Prerequisites:

  • 1. Knowledge of security concepts and basic cryptography primitives.
  • 2. Knowledge of high level programming language (C).
  • 3. Knowledge of network concepts.

1 and 2 were covered in ECE 6900: Security and privacy preservation for wireless networks.

slide-5
SLIDE 5

Course Description:

  • Advanced topics in the design of security and privacy protocols for the emerging

wireless networks.

  • Using advanced cryptography techniques to solve new security/privacy problems

raised in the emerging wireless networks.

  • To address the research streams in the security/privacy of the emerging wireless

networks’ applications.

0 - 4

Course Topics:

  • 1. Review to basic concepts in wireless networks.
  • 2. Review to basic security concepts and cryptography primitives.
  • 3. Emerging applications for wireless networks.
  • 4. Security and privacy challenges in emerging wireless networks’ applications.
  • 5. Advanced security schemes for the emerging wireless networks.
  • 6. Advanced privacy-preserving schemes for the emerging wireless networks.
slide-6
SLIDE 6

Security/privacy threats in emerging wireless networks Novel cryptography algorithms (tools to achieve security/privacy) Problems Solutions

0 - 5

slide-7
SLIDE 7

Course Textbook

  • No textbook is required.
  • The lecture materials will be derived from

a number

  • f

background papers and textbooks.

  • Various reading material and research papers will be given.

0 - 6

slide-8
SLIDE 8

Course Evaluation

1 - Assignm ents, reports, and presentations: 5 0 % of the final grade. To be done individually. 2 - Project: literature survey report. To be done individually. 2 0 % of the final grade. 3 - Tests: 1 0 % of the final grade. OPEN book, notes, laptops, etc. 4 - Final exam : The final examination will count for 2 0 % of the final grade. OPEN book, notes, laptops, etc.

0 - 7

slide-9
SLIDE 9

Expectations

  • The literature survey and the reports are 7 0 % of the final

grade but that does not m ean you w ill get m ost of this grade even if you do poor w ork. W rong assum ption

  • When I ask for a survey or a report, it has to be well done.
  • Do not assume that you will pass without enough work

because I’m your advisor. W rong assum ption

  • For the survey and the presentation, you will need several

meetings with me to get guidance.

  • Class participation: Your input is needed for good

discussion

  • Fully understand the slides, lectures, and assignments
  • Be on time (if you are late enter the class quiet)

0 - 8

slide-10
SLIDE 10

Expectations

  • Focus in classes and take good notes
  • Get help early if you need. It is your responsibility to seek

help from the instructor.

  • Begin studying the material the same day it is presented –

do not accumulate lectures – the number of slides may be large – each lecture builds on the previous ones.

0 - 9

slide-11
SLIDE 11

0 - 10

  • Slides are protected by a password.
  • You do not need to type the password every time you open the files.
  • You can cancel the password protection after you download and open

the files as follows

slide-12
SLIDE 12

0 - 11

slide-13
SLIDE 13

Questions

Mohamed Mahmoud