Review of Basics of Communication Networks, Network Security, AI/ ML, Power Systems, Blockchains and Game Theory, Zero Trust Networks, Eigentrust, Threshold Cryptography and its Applications to Network Security, Multi-factor Authentication, Access Control in the Operating System, RFIDs and E-Passports, Web Services Security, Electronic Payment, Cyber Laws, Anonymous Connections and Onion Routing, Case Study: Tor: The Onion Router (detailed coverage), Applications of Blockchains to Network Security, Malware (detailed coverage), Drone Security, Advanced Wi-Fi Security and the Security of Cellular Networks, Smart Grid Security, Security Games (detailed coverage), System-Level Security (detailed coverage), Firewalls and Intrusion Detection Systems (detailed coverage), Security in Wireless Ad Hoc and Sensor Networks (detailed coverage), Information Theoretic Security, Review of Quantum Physics including Quantum Entanglement, Introduction to Quantum Network Security.
1) The emphasis of this course will be on network security and for most of this course, it will be assumed that the underlying cryptographic primitives are secure.
2) As part of the course project, students will be encouraged to (i) either work on a research project, or (ii) discover vulnerabilities in various real-world networking protocols and to propose and/ or implement mechanisms to defend against them.
W. Stallings, “Cryptography and Network Security: Principles and Practice”, Pearson Education, 7th edition, 2016.
C. Kaufman, R. Perlman, M. Speciner, “Network Security: Private Communication in a Public World”, Pearson Education, 2nd edition, 2002.
J. Edney, W.A. Arbaugh, “Real 802.11 Security: Wi-Fi Protected Access and 802.11i”, Pearson Education, 2004.
E. Rescorla, “SSL and TLS: Designing and Building Secure Systems”, Addison-Wesley, 2001.
B.L. Menezes and R. Kumar, “Cryptography, Network Security and Cyber Laws”, Cengage Learning India Pvt. Ltd., 2018.