- Summer 2002 Study Group with Dr. T. A. Yang
Time: 9-11am Saturdays (see the schedule below for specific dates)
Place: Delta 105
Date | Assigned study list (or tasks) for the week | Due |
6/8 | IEEE 802.11
|
NOTE:
Study the articles for the week before the meeting. All projects are due before the meeting. Send the projects as attachments to yang@uhcl.edu . Use self-explanatory subject line. |
6/15 | Decompilation,
Obfuscation & Watermarking
+ Dyer, Dave (1997). Java decompilers compared . Java World. July 1997. |
Project 1
A. (20 pts) Write a one page report explaining what security problems are associated with IEEE 802.11 protocol. Summarize alternative solutions for the problems. |
6/22 | News articles about
wireless security
+ Held, Gilbert (2001). Considering wireless LANs: proceed with caution . International Journal of Network Management, Volume 11, Issue 4, July–August 2001, page 205. |
Project 2
A. (30 pts) Decompilation versus Obfuscationa. Download the Mocha decompiler from http://www.brouhaha.com/~eric/computers/mocha.html . Try to decompile a bytecode using the decompiler. Hand in the Java source and the decompiled version.
b. (15 pts) Compare the content of the articles you found against those articles listed as last week's study list (6/15). Write a summary paragraph explaining at least three major changes in the 'wireless security' field since Feb. 2002. |
6/29 | Protocols and
Software Paradigms of Mobile Networks
|
Project 3
A. (40 pts) Download the Java 2 Platform Micro Edition, Wireless Toolkit, from http://java.sun.com/products/j2mewtoolkit/index.html . Set up the development environments, especially the emulator, on a computer and try out a sample wireless application. Check out the J2ME Development Tutorial , and the Secure Java MIDP Programming Using HTTPS with MIDP . |
7/6 | SSL / TLS
|
Design of
the final project due |
7/13 |
Security for mobile applications
|
Check the FAQ at http://www.apple.com/airport/faq/ to find introductory information about LEAP, RADIUS , et. al. Check out IEEE 802.1X Overview: Port Based Network Access Control to see how EAP is encapsulated in 802.1X. + IEEE 802.11 Security and 802.1X (Summary of Vulnerabilities in 802.11 and 802.1X) |
7/20 | RADIUS and
related protocols
|
|
7/27 | Wireless
Application Protocol (WAP) et. al.
|
Final project
demonstration & discussions (New
due date) |
8/3 |
Mobile Messaging and the Lightweight
& Efficient Application Protocols (LEAP)
|
Final report
(New due
date) |
Additional References:
Books
CDMA
Cisco
HP/Compaq wireless information
IPSec
J2ME
Microsoft Wireless Networking
Network Computing
NetworkWorld
RSA
Security in e-commerce
Software Protection, Java and Obfuscation
TKIP
VPN
Wireless Internet and Intranet access
- Cisco Tech Notes: How Virtual Private Networks Work
- Cisco VPN 3000 Concentrator Series
- Cisco VPN 3002 Hardware Client
- "Cisco VPN 3002: Easy LAN-to-LAN VPN Setup the Hardware Way" . Network Computing (5/28/2001).
- ISP-Planet's series surveys of VPN appliances
- Peitsch, Charles. Special Report: ecisions, decisions, decisions about VPN . ASP Connection (an on-line resource for application service providers). Oct. 2001.
- Allen, Doug. Special Report: VPN Overlay Networks: An Answer To Network-Based IP VPNs? NetworkMagazine.Com. June 2001.
- Bennington, Bernard J. and Charles R. Bartel (2001). Wireless Andrew: building a high speed, campus-wide wireless data network . Mobile Networks and Applications, Volume 6, Issue 1. Jan./Feb. 2001. Pages: 9 - 22.
- Schläger, M., B. Rathke, A. Wolisz, and S. Bodenstein (2001). Advocating a remote socket architecture for internet access using wireless LANs . Mobile Networks and Applications, Volume 6, Issue 1. Jan./Feb. 2001. Pages: 23 - 42.
- Maass, Henning (1998). Location-aware mobile applications based on directory services . Mobile Networks and Applications (Special issue on protocols and software paradigms of mobile networks ), Volume 3, Issue 2. August 1998.
- Zhuge, Lei, and Victor O. K. Li (2002). Reverse-link capacity of multiband overlaid DS-CDMA systems . Mobile Networks and Applications, Volume 7, Issue 2 (April 2002). Pages: 101 - 113.
- Su, William, Sung-Ju Lee, and Mario Gerla (2001). Mobility prediction and routing in ad hoc wireless networks . International Journal of Network Management, 11 (1) , pages 3-30.
WLAN security, steganography, et. al.
WLAN Equipments & Installation
- AirSnorf homepage
- John Verry. "Wireless security: not an oxymoron". TechRepublic. (September 27, 2002)
- IBM develops tool to detect rogue wireless LAN access points (June 2002)
- Steganography: Hidden Data (June 2002)
WWAN Equipments & Installation
- Cisco Aironet 350 Series Products Overview: http://www.cisco.com/univercd/cc/td/doc/pcat/ao350.htm (Access Points, Client Adapters, Workgroup Bridge, Wireless Bridge)
- Cisco Aironet 340 Series — Client Adapters and Access Points: http://www.cisco.com/univercd/cc/td/doc/pcat/340cl.htm#CFHEICDH
- Wireless PTP (Point-To-Point) Bridges . Network Computing (2/19/01)
- Fixed Wireless Equipment Review: ORiNOCO SOHO Network Kit
- http://www.sierrawireless.com/ProductsOrdering/pccards.html (Sierra wireless AirCard series)
- http://www.verizonwireless.com/express_network/index.html (Verizon express network service)
- http://www.mobilecomms-technology.com/projects/broadband_gallery.html
- HP Education station: wireless WAN
- Wireless Wide Area Networks For Mobile Computing Applications
- Emerging Wireless Data Networks
- Wireless WAN Infrastructure and Services
- Sprint Announces Industry Milestone as First U.S. Wireless Carrier to Complete Nationwide Network Upgrade to 3G 1X (8/8/02)
- PCS Connection Card by Sierra Wireless Aircard® 550