Selected Topics in Wireless Security: Network Coding to Economics of Security

Prof. Radha Poovendran
Network Security Lab (NSL), University of Washington, Seattle, USA

Applications using wireless networking include healthy networks to e-enabled, future aviation networks. While the use of wireless technology enables easy deployment, it also opens up a slew of challenges in admission and control, coordination and communication. In addition, wireless medium involuntarily sets up a host of new security vulnerabilities. It has been noted by the research community that wireless environment requires new security models and cannot make use of classical adversarial models.

This summer lecture series (along with Professor Dawn Song of Berkeley) is intended to present selected topics in wireless networking that are of interest to the speakers. The topics include the following:

  1. Adversarial modeling and capturing the impact of them in network protocols (this will include exposure to convex optimization, network flows and modeling impact via network flows) as well as graph theoretic modeling of adversarial scenarios;
  2. Information Theoretic modeling and representation of security (including the fundamental theorems, results related to wireless);
  3. Introduction to network coding, secure network coding from older notions to the recent pairing versions;
  4. Vulnerability metrics from internet type to general social networks, problems with definitions, challenges and directions of major bottlenecks in widely useable metrics;
  5. An economic view of security in wireless networks---framework, and problems;
  6. Application domains---cognitive radios, cyber-physical systems, and device identification and classification.

Applied Cryptography for Achieving Privacy in Wireless Applications, and Defending against Malicious Code in Mobile Computing

Prof. Dawn Song
University of California at Berkeley, USA.

  1. Applied Cryptography for Achieving Privacy in Wireless Applications (I): Foundations;
  2. Applied Cryptography for Achieving Privacy in Wireless Applications (II): Computation over Encrypted Data;
  3. Applied Cryptography for Achieving Privacy in Wireless Applications (III): Searches over Encrypted Data;
  4. Defending against Malicious Code in Mobile Computing (I): Foundations;
  5. Defending against Malicious Code in Mobile Computing (II): Techniques and Tools for in-depth Malware Analysis;
  6. Defending against Malicious Code in Mobile Computing (I): Principles and Architectures for Better Security.