Security Projects for Systems and Networking Professionals

Every day, people interact with numerous computer systems, networks, and services that require the exchange of sensitive data. However, the Internet is a highly distributed system operated by many different entities and as such should not be trusted by end users. Users, whether consumers or businesses, retain no control over how their information is routed among the many networks that comprise the Internet. Therefore, there is a strong need for cryptographic protocols to authenticate, verify trust, and establish a secure channel for exchanging data. This chapter presents a series of projects and demonstrations for systems and networking professionals who want to increase their comprehension of security concepts and protocols. The material presented here is derived from existing courses taught by the authors in the areas of cryptography, network security, and wireless security.

[1]  E. Seymour,et al.  Talking About Leaving: Why Undergraduates Leave The Sciences , 1997 .

[2]  J.K. Yates,et al.  Creating awareness about engineering careers: innovative recruitment and retention initiatives , 1999, FIE'99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No.99CH37011.

[3]  Yair Linn An Ultra Low Cost Wireless Communications Laboratory for Education and Research , 2012, IEEE Transactions on Education.

[4]  J.T. Tester,et al.  Developing recruitment and retention strategies through "Design4Practice" curriculum enhancements , 2004, 34th Annual Frontiers in Education, 2004. FIE 2004..

[5]  Hal Berghel,et al.  WiFi attack vectors , 2005, CACM.

[6]  S. Blaisdell,et al.  A comprehensive programmatic approach to recruitment and retention in the College of Engineering and Applied Sciences , 1999, FIE'99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No.99CH37011.

[7]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[10]  L. Gladney,et al.  Teaching biophysics. Strategies for recruiting and retaining minorities in physics and biophysics. , 1993, Biophysical journal.

[11]  Sandra Courter,et al.  From the Students' Point of View: Experiences in a Freshman Engineering Design Course , 1998 .

[12]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[13]  John T. Tester,et al.  The design4practice sophomore design course: Adapting to a changing academic environment , 2005 .

[14]  Gene Tsudik,et al.  Security and privacy in emerging wireless networks [Invited Paper] , 2010, IEEE Wireless Communications.

[15]  M. Drenth San Juan, Puerto Rico , 2001 .

[16]  Gregory Kipper,et al.  Investigator's Guide to Steganography , 2003 .

[17]  Nurul I. Sarkar,et al.  Teaching wireless communication and networking fundamentals using Wi-Fi projects , 2006, IEEE Transactions on Education.

[18]  Sonja M Glumich,et al.  DefEX: Hands-On Cyber Defense Exercise for Undergraduate Students , 2011 .

[19]  Hong Wang,et al.  From C to Python: Impact on Retention and Student Performance , 2009, FECS.

[20]  Sneha Kumar Kasera,et al.  Emergency service in Wi-Fi networks without access point association , 2011, ACWR '11.

[21]  Xiaohong Yuan,et al.  Laboratory design for wireless network attacks , 2008, InfoSecCD2008 2008.

[22]  Francisco Alfredo Márquez,et al.  WiFiSiM: An Educational Tool for the Study and Design of Wireless Networks , 2013, IEEE Trans. Educ..

[23]  S Vinjosh Reddy,et al.  Wireless hacking - a WiFi hack by cracking WEP , 2010, 2010 2nd International Conference on Education Technology and Computer.

[24]  Hüseyin Arslan,et al.  A Wireless Communications Systems Laboratory Course , 2010, IEEE Transactions on Education.

[25]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[26]  Zeljko Zilic,et al.  A Laboratory Setup and Teaching Methodology for Wireless and Mobile Embedded Systems , 2008, IEEE Transactions on Education.

[27]  Richard H. McCuen,et al.  Discovery approach to teaching engineering design , 1995 .

[28]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[29]  H. Boland,et al.  Security issues of the IEEE 802.11b wireless LAN , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).