T. Andrew Yang

Email: yang@uhcl.edu

Web page : http://sce.uhcl.edu/yang/

Tel.: (281) 283-3835


Last updated:

 

June 14, 2010

CSCI 5235 Network Security

Summer 2010

Individual research project

Hands-on projects

Check the syllabus page to find out the due dates.

NOTE: This page is subject to revision, especially during the first two weeks of the semester.


  • Research project
    • Each student is to study a topic related to Networking Security, whether it is a mechanism, a protocol, a tool, a standard being developed, an emerging research, etc.
    • A preliminary abstract of your presentation topic is due early in the semester. The final presentation will be made in class after the mid semester.
    • The objective of studying a focused area in Network Security is to help you develop research competence in surveying a chosen topic, collecting cited references, and make an organized presentation of your findings.
    • Each presentation should last about 30 minutes, followed by 10-minute Q&A.

Potential Topics

Authentication in wireless sensor networks (WSN)

Message integrity in wireless sensor networks

WiMax security

Simulation of WiMax networks

Authentication in mobile ad hoc networks (MANET)

 

Requirements

    • ABSTRACT

Note: Post your presentation abstract in the class discussion group. Each person should comment on five or more of your classmates’ abstract.

The abstract should be 1-2 pages long, and contains the following sections:

1.      Class name (i.e., CSCI5235 Network Security)

2.      Your name (and email address)

3.      Title of your presentation

4.      General description of the topic

5.      Why is the topic worth presenting? What’s its significance relevant to Network Security?

6.      Two or more articles related to the topic. Important: Properly cite other researcher or professional’s work. Visit http://sce.uhcl.edu/yang/citing.htm for more information about cited references.

7.      A tentative outline (agenda) of your presentation.

 

    • ORAL IN-CLASS PRESENTATION

8.      Each presentation should last about 20 minutes, followed by 10-minute Q&A.

9.      Three days before your scheduled presentation date, send your presentation slides to the instructor, so he may post your presentation at the class site. Depending on your presentation style, the number of slides should be between 20 and 30 (about one minute per slide).

10.   Collect comments made by the audience during the presentation. The comments and your responses should be included in the written report.

 

    • WRITTEN PRESENTATION / REPORT

11.   The written report should include your findings about the chosen topic.

12.   It should have 10-15 pages with proper cited references.

13.   The report should be composed of the following sections:

a.      Title

b.      Your name (and email address)

c.      An abstract (50-100 words)

d.      Introduction to the topic

e.      Significance of the chosen topic with respect to Network Security

f.       Your findings

g.      Future work: research ideas and projects related to the topic

h.     Conclusion

i.       Appendix: Collected comments and your responses

Note: Post your report draft in the class discussion group. Each person should comment on five or more of your classmates’ drafts.

Send the final written report as an email attachment to yang@uhcl.edu.

Go to the Index


  • Hands-on Projects

There are four team projects in this class. Every two students form a project team, and work together to have the projects completed. The first three projects are required; completing the last project will earn you extra points!

Visit the project page at http://www.dcsl-uhcl.net/public/Downloads.html to find descriptions of the posted projects and software download for the projects. (If the DCSL server is not available, find the projects here.)

Requirements

    • Form your team: During the first week, form a two-person team. Post the following information to the class discussion board: Team name, member names (with email addresses). Note: It is ok if you prefer to work by yourself.
    • Swappable drives: Each person should check out from the instructor a swappable hard drive (and a lock/unlock key), which is to be used in the D158A Computer Security Lab. You will need to install an appropriate operating system and related software on the disk for each of the projects. Get a copy of the Windows CD from the instructor.
    • For each of the projects:
      • Demo & evaluation of the project: When the project is due, prepare to give the instructor a demo in D158A.
      • Project report: Hand in a written evaluation of the project, including lessons learned from that project, weakness and strength of the project design, possible improvements of the project design.

Go to the Index

  Main Page

  Biography

  Teaching

o   Office hours

   Research

o   Active projects

o   Research interest

o   Publications

o   Presentations

o   Grants

   Services

o   Student support

o   Committees

o   Curricular development

o   Centers

    Other Links