Tuesday, July 30, 2013

CU9257 COMMUNICATION NETWORK SECURITY

CU9257 COMMUNICATION NETWORK SECURITY

UNIT I INTRODUCTION ON SECURITY

Security Goals, Types of Attacks: Passive attack, active attack, attacks on
confidentiality, attacks on Integrity and availability. Security services and mechanisms,
Techniques : Cryptography, Steganography , Revision on Mathematics for
Cryptography.

UNIT II SYMMETRIC & ASYMMETRIC KEY ALGORITHMS

Substitutional Ciphers, Transposition Ciphers, Stream and Block Ciphers, Data
Encryption Standards (DES), Advanced Encryption Standard (AES), RC4, principle of
asymmetric key algorithms, RSA Cryptosystem

UNIT III INTEGRITY, AUTHENTICATION AND KEY MANAGEMENT

Message Integrity, Hash functions : SHA, Digital signatures : Digital signature standards.
Authentication : Entity Authentication: Biometrics, Key management Techniques.
UNIT IV NETWORK SECURITY , FIREWALLS AND WEB SECURITY

Introduction on Firewalls, Types of Firewalls, Firewall Configuration and Limitation of
Firewall. IP Security Overview, IP security Architecture, authentication Header, Security
payload, security associations, Key Management. Web security requirement, secure
sockets layer, transport layer security, secure electronic transaction, dual signature

UNIT V WIRELESS NETWORK SECURITY

Security Attack issues specific to Wireless systems: Worm hole, Tunneling, DoS. WEP
for Wi-Fi network, Security for 4G networks: Secure Ad hoc Network, Secure Sensor
Network

REFERENCES:
1. Behrouz A. Fourcuzan ,” Cryptography and Network security” Tata McGraw- Hill,
2008
2. William Stallings,"Cryptography and Network security: principles and practice",2ndEdition,Prentice Hall of India,New Delhi,2002
3. Atul Kahate ,” Cryptography and Network security”, 2nd Edition, Tata McGraw-Hill, 2008
4. R.K.Nichols and P.C. Lekkas ,” Wireless Security”
5. H. Yang et al., Security in Mobile Ad Hoc Networks: Challenges and Solution, IEEE Wireless Communications, Feb. 2004.
6. Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, December 1999.
7. "Security of Wireless Ad Hoc Networks," http://www.cs.umd.edu/~aram/wireless/survey.pdf.
8. David Boel et.al (Jan 2008 ) “Securing Wireless Sensor Networks –
Security Architecture “ Journal of networks , Vol.3. No. 1. pp. 65 -76.
9. Perrig, A., Stankovic, J., Wagner, D. (2004), “Security in Wireless Sensor
Networks”, Communications of the ACM, 47(6), 53-57.

Buy Cryptography and Network Security 2 Edition: Book

Buy Cryptography and Network Security : Principles and Practice 5 Edition: Book







No comments:

Post a Comment