T. Andrew Yang

Email: yang@uhcl.edu

Web page:  http://sce.uhcl.edu/yang/

Tel.: (281) 283-3835


Last updated:

 

Nov. 19, 2008

CSCI5931-03 Research Topic

Wireless and Sensor Networks


Fall 2008  (8/25-12/6 + final week)

 

Lecture Notes & Schedule

Assignments / Projects

  • Resources, etc.:

How to cite published work in your papers?

Important! Read the above before writing your papers or reports.

 

To obtain articles from the ACM Digital Library or the IEEE Xplore:

Use any of the lab computers in the campus to download the articles from http://www.acm.org/dl  or http://ieeexplore.ieee.org/xpls/VSearch.jsp.  Note: The links may not work outside the campus unless you’ve got your own digital library subscription from either site.


Time (Classroom):

Thur. 4 – 6:50pm

Prerequisite:   CSCI4132 (Network Protocols) and CSCI5233 (Computer Security and Integrity), or instructor’s approval.

Course Objectives:    This course provides an essential study of issues and methods in wireless and sensor networks, which are composed of either fixed or mobile devices employing various wireless communication schemes.  Topics to be covered include overview of wireless networking protocols (IEEE 802.11, 802.15, 802.16, GPRS, CDMA, etc.), the basics of wireless sensor networks (WSN), and various topics related to WSN, including protocols, services, applications, sensor programming, key management, and WSN security issues (such as privacy, integrity, authentication, secure localization, secure aggregation, attacks and defense mechanisms).

Learning Outcome:

1.      Understand the fundamental concepts of wireless and sensor networks

2.      Can develop simple wireless sensor network applications using actual motes and sensor devices

3.      Can develop simple wireless sensor network applications using network simulators

4.      Be able to perform a survey of research articles in a specific area of wireless sensor networks

5.      Be able to develop in-depth understanding of a specific research area in wireless sensor networks

 

Class Format: 

Lectures are combined with discussions and, if applicable, student presentations and discussions of advanced topics.  Students are expected to be active participants, by studying the relevant chapters and/or research papers and participating at in-class discussions. 

To enhance students’ understanding of wireless sensor networks (WSN), hand-on programming projects using sensor network simulators and commercial WSN devices (such as those manufactured by the Crossbow, Inc.) to develop sensor applications will be included in the course. Students are expected to make oral presentations of topics related to wireless sensor networks.


Instructor:   Dr. T. A. Yang 

  • (office) Delta 106
  • Office hours (NOTE: If the suite office is locked, you may use the phone outside the office to call me, by entering the extension 3835).

You are highly encouraged to send your questions to me by e-mails or by posting the question to the discussion group. You, however, are responsible for clearly describing the problem(s) you have encountered, the solution(s) you have tried, and the outcome you have got from these solution(s).

  • (phone#) (281) 283-3835 (Please leave a message if not available.)
  • (email address) yang@uhcl.edu (Note: Emails without a proper subject line and your full name will be discarded.   Here is a sample subject line: “CSCI 5931 project #1, question 1”.
  • (web site)  http://sce.uhcl.edu/yang/

Required Text: No textbook is required. Instead of a textbook, a set of selected research papers and online resources will be used as the fundamental study materials in this course. See the References page for a list of papers and resources.

 


Topics, Notes &  Schedule

  • The due dates are fixed and will not be extended, unless specifically announced.  Start your work early!
  • The topics column is subject to change when the class moves on.  Check with the instructor if you have doubt concerning the teaching schedule.

Wk (dates)

Topics: papers

Due Dates

1 (8/28)

Syllabus, projects, presentations, etc.

Introduction to Wireless Networks

·                     Wireless network (from Wikipedia, the free encyclopedia) http://en.wikipedia.org/wiki/Wireless_network

·                     O’Reilly’s Wireless Developer Center: http://www.oreillynet.com/wireless/

Each student may work alone or with a teammate on the projects. If you’d like to work in a two-person team, send your team membership information (names, email addresses) to yang@uhcl.edu before the 2nd class. 

2 (9/4)

Basics of WSN

-          Brain, Marshall. “How Motes Work?” http://computer.howstuffworks.com/mote.htm/printable.

-          Tran, Sam Phu Manh, and T. Andrew Yang. “OCO: Optimized Communication & Organization for Target Tracking in Wireless Sensor Networks”. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006). Taichung, Taiwan. 6/5-7, 2006. (local copy) slides

Selection of papers for oral presentations

NOTE: Each student is to select one or two papers to present in the class (starting with the topics listed in week 4 and later). Send the list of papers to yang@uhcl.edu before the 3rd class. Feel free to suggest alternate papers to present. Make sure you send the full bibliographic information to the instructor.

If a slide file is provided, you may use it or create your own presentation slides.

3 (9/11)

Cancelled due to hurricane

4 (9/18)

Cancelled due to hurricane

 

5 (9/25)

Sensor Network Programming

-          Developing a WSN application using crossbow devices and s/w slides

-          TinyOS and Sensor application development using Crossbow sensor products slides

-          Development of Emulation Projects for Teaching Wireless Sensor Networks

-          Emulation of Wireless Sensor Networks for Object Tracking

 

 

6 (10/2)

Wireless attacks and defending mechanisms

-          Wood, A.D., and J. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer, (Oct. 2002), 54-62. local copy slides (Pratik)

 

WSN Key Management

-          Eschenauer, L., and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proceedings of ACM Conference on Computer and Communications Security (ACM CCS), Washington DC, pp. 41-47, 2002. local copy slides (Vishal)

Study Questions:

1. What is tampering and how it can be prevented ?

2. What is the prevention mechanism against Jamming ?

 

 

Study Questions:

1. Drawbacks of the scheme.

2. Why is the proposed scheme more secure than single mission key and (n-1) keys schemes?

 

7 (10/9)

No class meeting

project 1

8 (10/16)

midterm exam

Midterm

Project 1 Demo

9 (10/23)

Wireless attacks and defending mechanisms

-          Sun, B., C.-C Li, K. Wu, and Y. Xiao, “A Lightweight Secure Protocol for Wireless Sensor Networks”, Elsevier Computer Communications journal Special Issue on Wireless Sensor Networks: Performance, Reliability, Security, and Beyond, Nov. 2005. local copy slides (Abhijeet)

-         Newsome J., E. Shi, D. Song, and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis and Defenses,” Proc. IEEE Information Processing on Sensor Networks (IPSN), Berkeley, CA, Apr. 2004, pp. 259-268. local copy slides (Ravinder)

 

* 10/27: Last day to drop from a class without a grade

10 (10/30)

Presentation of your project’s abstract (everyone)

NOTE: Post your abstract to the discussion group at least 48 hours before the class.

Abstract of the exploration project

Make-up class (Sat. 11/1)

-          C. Liu, K. Wu, and V. King, “Randomized Coverage-Preserving Scheduling Schemes for Wireless Sensor Networks,” Proc. IFIP Networking Conf. 2005, May 2005. local copy

-          Liu, C., K. Wu, Y. Xiao, and B. Sun, "Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 6, June 2006, pp. 562-575. local copy slides

NOTE: Read this paper to learn how to review a research paper.

Compare the methods proposed in these two papers and write a short paper explaining whether ‘guaranteed connectivity’ is achieved in the 2006 paper. If yes, explain how; if no, explain why not. Post your short paper to the discussion group.

 

11 (11/6)

-         Karlof, C., N. Sastry, and D. Wagner, “TinySec: a Link Layer Security Architecture for Wireless Sensor Networks,” Proceedings of the 2nd international conference on Embedded networked sensor systems (ACM SenSys’04), Baltimore, MD, USA, pp. 162 - 175. local copy slides (Sridhar)

-          Karlof, C., and D. Wagner,” Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, May 11, 2003. local copy slides (Darshan)

project 2

Make-up class (Sat. 11/8)

-          Zhu, S., S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks,” IEEE Symposium on Security and Privacy, Oakland, CA, May 9-12, 2004, pp. 260-272. local copy

 

NOTE: Read this paper to learn how to review a research paper.

Post your synopsis of reading this paper to the discussion group. Explain clearly how the hop-by-hop authentication work by drawing some example diagrams to illustrate the method.

12 (11/13)

-         Wood, A.D., and J. Stankovic, S. Son, “JAM: A Jammed-area Mapping Service for Sensor Networks,” Proceedings of the 24th Realtime System Symposium (RTSS), Cancun, Mexico, Dec. 2003, pp. 286-297. local copy slides (Srikanth)

-          Sun, B., F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, “Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks”, IEEE Tran. on Vehicular Tech., Vol. 55, No. 3, May 2006. local copy slides (Aniruddha)

 

13 (11/20)

-         Hu, Y.-C., A. Perrig, and D. B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” 22nd International Conference on Computer Communications (INFOCOM’03), San Francisco, CA, Apr. 2003, pp. 1976-1986. local copy slides (Sagarika)

 

WSN Privacy, Integrity and Authentication

-          Taejoon Park, and Kang G. Shin, “Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks,” IEEE TRANSACTIONS On Mobile Computing, Vol. 4, No. 3, May/June 2005. local copy slides (Therese)

project 3

14 (11/27)

Secure Localization

-          Liu, D., P. Ning, and W. Du, “Attack-Resistant Location Estimation in Sensor Networks”, Proceedings of The Fourth International Conference on Information Processing in Sensor Networks (IPSN '05), Los Angeles, CA, pp. 99-106, April 2005. local copy slides (Quan)

 

Secure Aggregation

-          Hu, L., and D. Evans, “Secure Aggregation for Wireless Networks,” Workshop on Security and Assurance in Ad hoc Networks, January 2003. local copy slides (Atiya)

Post the final report of your exploration projects to the discussion group.

Collect comments from your classmates and use them to refine your reports.

 

15 (12/4)

Presentation of the exploration projects

Final report (Send it to yang@uhcl.edu. Due: 12/1)

16 (12/11)

Presentation of the exploration projects

 

 


Computer Labs & Hours

The NT Lab (Delta 119) is equipped with computers that have been properly configured to run Java applications requiring JCE and JDK.

 

Check http://sce.uhcl.edu/computing.asp for lab information, open hours, FAQs, etc.

Evaluation:

 

category

percentage

projects

35%

presentations

15%

tests

20%

final report

30%

NOTE:  The accumulated points from all the categories determine a person's final grade. There will be no extra-credit projects.

Grading Scale:

 

Percentile

Grade

93% or above

A

S90% - 92%

A-

87% - 89%

B+

84% - 86%

B

80% - 83%

B-

77% - 79%

C+

74% - 76%

C

70% - 73%

C-

60%-69%

D

59% or below

F

Tests:

Both analytic and synthetic abilities are emphasized. Being able to apply the learned knowledge toward problem solving is also highly emphasized in the tests. 

Assignments/Projects and Late Penalty:

Assignments and projects will be posted at the class web site. Assignments & projects are due before the beginning of the class on the due day.  See Topics and Notes for the due dates. 

Points will be deducted from late assignments: 20% for the first 24 hours after the due time, 40% for the next 24 hours, 70% for the third 24 hours, and 100% after that. No extension will be granted except for documented emergency.   Starting to work on the assignments as early as possible is always the best strategy.

NOTE: Unless otherwise specified, all assignments and projects are individual work.  Students should take caution not to violate the academic honesty policies.  See http://b3308-adm.uhcl.edu/PolicyProcedures/Policy.html for details of the University policies.

Assignments/Projects Guidelines:

  • Identification page: All assignments must have your name, and course name/number/section number (e.g., CSCI234-01 or CSCI5333-03) at the top of the first page.
  • Proper stapling:  Staple all the pages together at the top-left corner. NOTE: Do not use paper clips.
  • Order! Order!  Arrange the solutions following the sequence of the questions. Write the question number at the top-right corner of each page.
  • Word  processing:  It is required that you type your reports (e.g., print them using a printer). Use a word processor and appropriate typesetting and drawing tools to do the assignments.
  • Check the spelling and the grammar for the whole document before handing it in. You may loose points due to spelling or grammatical errors.
  • Use proper commenting and structure in your programs.

Projects:

The projects will involve the design and implementation of a secure N-tier web based application demonstrating the development of a secure Java online application using various technology.  Students are expected to employ the theories and techniques learned in the class to design and implement the system.  


Attendance Policy:

You are expected to attend all classes. If you ever miss a class, it is your responsibility to get hold of whatever may have been discussed in that class.

Instructor's Notes:

  • Unless due to unexpected, documented emergency, no make-up exams will be given.  No make-up exams will be granted once the exams have been corrected and returned to the class. 
  • Important:   If you think you have lost some points due to grading errors, make sure you approach the instructor within a week after the assignment, project, or test is returned to you.  
  • To get the most out of this class, you need to read the textbooks and spend time using computers regularly.  Be prepared for a class by preview the material to be covered in that class and participate in discussions and problem-solving exercises, if applicable, in the class.
  • Due to the intensive nature of graduate classes, 15-20 hours per week are expected of students in studying the textbook/notes and working on the assignments, in addition to class attendance.   Expect to spend more hours during summer sessions.

Go to the  Index

  Main Page

  Biography

  Teaching

o    Office hours

   Research

o    Active projects

o    Research interest

o    Publications

o    Presentations

o    Grants

   Services

o    Student support

o    Committees

o    Curricular development

o    Centers

    Other Links