CU9257 COMMUNICATION NETWORK SECURITY
UNIT I INTRODUCTION ON SECURITY
Security Goals, Types of Attacks: Passive attack, active attack, attacks on
confidentiality, attacks on Integrity and availability. Security services and mechanisms,
Techniques : Cryptography, Steganography , Revision on Mathematics for
Cryptography.
UNIT II SYMMETRIC & ASYMMETRIC KEY ALGORITHMS
Substitutional Ciphers, Transposition Ciphers, Stream and Block Ciphers, Data
Encryption Standards (DES), Advanced Encryption Standard (AES), RC4, principle of
asymmetric key algorithms, RSA Cryptosystem
UNIT III INTEGRITY, AUTHENTICATION AND KEY MANAGEMENT
Message Integrity, Hash functions : SHA, Digital signatures : Digital signature standards.
Authentication : Entity Authentication: Biometrics, Key management Techniques.
UNIT IV NETWORK SECURITY , FIREWALLS AND WEB SECURITY
Introduction on Firewalls, Types of Firewalls, Firewall Configuration and Limitation of
Firewall. IP Security Overview, IP security Architecture, authentication Header, Security
payload, security associations, Key Management. Web security requirement, secure
sockets layer, transport layer security, secure electronic transaction, dual signature
UNIT V WIRELESS NETWORK SECURITY
Security Attack issues specific to Wireless systems: Worm hole, Tunneling, DoS. WEP
for Wi-Fi network, Security for 4G networks: Secure Ad hoc Network, Secure Sensor
Network
REFERENCES:
1. Behrouz A. Fourcuzan ,” Cryptography and Network security” Tata McGraw- Hill,
2008
2. William Stallings,"Cryptography and Network security: principles and practice",2ndEdition,Prentice Hall of India,New Delhi,2002
3. Atul Kahate ,” Cryptography and Network security”, 2nd Edition, Tata McGraw-Hill, 2008
4. R.K.Nichols and P.C. Lekkas ,” Wireless Security”
5. H. Yang et al., Security in Mobile Ad Hoc Networks: Challenges and Solution, IEEE Wireless Communications, Feb. 2004.
6. Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, December 1999.
7. "Security of Wireless Ad Hoc Networks," http://www.cs.umd.edu/~aram/wireless/survey.pdf.
8. David Boel et.al (Jan 2008 ) “Securing Wireless Sensor Networks –
Security Architecture “ Journal of networks , Vol.3. No. 1. pp. 65 -76.
9. Perrig, A., Stankovic, J., Wagner, D. (2004), “Security in Wireless Sensor
Networks”, Communications of the ACM, 47(6), 53-57.
UNIT I INTRODUCTION ON SECURITY
Security Goals, Types of Attacks: Passive attack, active attack, attacks on
confidentiality, attacks on Integrity and availability. Security services and mechanisms,
Techniques : Cryptography, Steganography , Revision on Mathematics for
Cryptography.
UNIT II SYMMETRIC & ASYMMETRIC KEY ALGORITHMS
Substitutional Ciphers, Transposition Ciphers, Stream and Block Ciphers, Data
Encryption Standards (DES), Advanced Encryption Standard (AES), RC4, principle of
asymmetric key algorithms, RSA Cryptosystem
UNIT III INTEGRITY, AUTHENTICATION AND KEY MANAGEMENT
Message Integrity, Hash functions : SHA, Digital signatures : Digital signature standards.
Authentication : Entity Authentication: Biometrics, Key management Techniques.
UNIT IV NETWORK SECURITY , FIREWALLS AND WEB SECURITY
Introduction on Firewalls, Types of Firewalls, Firewall Configuration and Limitation of
Firewall. IP Security Overview, IP security Architecture, authentication Header, Security
payload, security associations, Key Management. Web security requirement, secure
sockets layer, transport layer security, secure electronic transaction, dual signature
UNIT V WIRELESS NETWORK SECURITY
Security Attack issues specific to Wireless systems: Worm hole, Tunneling, DoS. WEP
for Wi-Fi network, Security for 4G networks: Secure Ad hoc Network, Secure Sensor
Network
REFERENCES:
1. Behrouz A. Fourcuzan ,” Cryptography and Network security” Tata McGraw- Hill,
2008
2. William Stallings,"Cryptography and Network security: principles and practice",2ndEdition,Prentice Hall of India,New Delhi,2002
3. Atul Kahate ,” Cryptography and Network security”, 2nd Edition, Tata McGraw-Hill, 2008
4. R.K.Nichols and P.C. Lekkas ,” Wireless Security”
5. H. Yang et al., Security in Mobile Ad Hoc Networks: Challenges and Solution, IEEE Wireless Communications, Feb. 2004.
6. Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, December 1999.
7. "Security of Wireless Ad Hoc Networks," http://www.cs.umd.edu/~aram/wireless/survey.pdf.
8. David Boel et.al (Jan 2008 ) “Securing Wireless Sensor Networks –
Security Architecture “ Journal of networks , Vol.3. No. 1. pp. 65 -76.
9. Perrig, A., Stankovic, J., Wagner, D. (2004), “Security in Wireless Sensor
Networks”, Communications of the ACM, 47(6), 53-57.
No comments:
Post a Comment