You are on page 1of 13

Course Profile

MCS 135

SECURE PROTOCOL DESIGN

Amity Institute of Information Technology

Odd, 2022
1. Staff Details

Position Name Email Consultation times Contact Details


and locations

Course Coordinator Dr. Shafiq Ul srehman@jpr.amity.edu Prior appointment 7006883351


Rehman required, AIIT
Faculty Chamber

Teaching Faculty Dr. Shafiq Ul srehman@jpr.amity.edu Prior appointment 7006883351


Rehman required, AIIT
Faculty Chamber

2. Course information
Course Credit: 03
Pre-requisite(s): Nil
Teaching times and locations: According to the time table and assigned class rooms

2.1 Course summary


Nowadays security protocols are key component in providing security services for fixed and mobile
networks. These services include data confidentiality, radio link encryption, message integrity, mobile
subscriber authentication, electronic payment, certified e-mail, contract signing, nonrepudiation and so
on. This course is concerned with design of effective security protocols.

2.2 Course aims


The aim of this course is to introduce the basic concepts of secure protocol design. In this course
network communication protocols will be introduced and some common attacks against security
protocols will be discussed. The vulnerabilities that lead to the attacks will be analyzed and guidelines
for effective security protocol design will be proposed. The presented guidelines can be applied to the
existing networking infrastructure.

2.3 Course learning outcomes (CLO) & Program Learning Outcome


(PLO)
At the successful completion of this course the student should be able to:
CLO 1: Understand the basic concepts of network communication protocols
CLO 2: Design security mechanism for network communication protocols
CLO 3: Find vulnerabilities in network communication protocols
CLO 4: Implement secured communication protocols over the networks
PLO 1: Apply a sound knowledge of communication protocols to the identification,
analysis and solution related to networking case studies.

PLO 2: Utilize the theory, tools, and techniques learned in secure protocol design course
to analyze and design the secured network architectures.

PLO 3: Utilize the theory, tools and techniques learned in SPD course to apply the
effective security measures.

PLO 4: Apply a high level of knowledge and skills in the applications of SPD concepts
and problem solving; to Grow and develop new standards, protocols, techniques, and
applications in networking area.

2.4 Relationship between course and program learning outcomes and


assessments
Course Learning LO Statement Program Learning Related Tasks &
Outcome (CLO) Outcome (PLO) Assessment

CLO 1 Understand the basic concepts of PLO 1 [1][4]


network communication protocols

CLO 2 Design security mechanism for network PLO 2 [2][4]


communication protocols

CLO 3 Find vulnerabilities in network PLO 3 [3][4]


communication protocols

CLO 4 Implement secured communication PLO 4 [4]


protocols over the networks

3. Strategies and approaches to learning

3.1 Learning and teaching activities


• Online/Live Lecture
• Assigned Reading
• Scientific Animations
• Formative Quizzes

• Debates
• Case Studies
• Problem Based Learning
3.2 Expectations of students

In this course, the participant is expected to be an active learner, the following are the expectations

• Preparation for the lecture: As per the course content delivery schedule students must go through
the related subject matter in prescribed text / reference books. During the lecture, some conceptual
queries may be raised to test understanding.
• Assignments: The assignments will be provided for self-practice, participants are expected to
compare their solutions with the same and discuss the differences, if any, in lecture to understand
the reasons. It is very important that participants prepare the homework assignments beforehand.
• Teamwork: The case-based assignments will be group assignments and are focused to test the
ability to understand, analyse and to think critically. The objective of group assignment is also to test
the ability to logically convince other team members about individual’s assumptions and approach
and reach a group conclusion and present the same. All the students are expected to contribute to
the group and be prepared to present the groups’ approach to analysis and conclusion.
• Application: The objective of this course is not to memorise information and formulas. The focus of
the assessment will be on individuals’ understanding of concepts, ability to apply model based on
problem appropriately, problem solving and critical thinking. Therefore, the test and quizzes will be
on an open-book format and a sheet listing key concepts and terminologies will be provided during
the End Semester Examination.

4. Course schedule and structure


[This course consists of 36 hours of class contact hours. You are expected to take an additional 2 hours of
non-class contact hours to complete assessments, readings and exam preparation.]

Week Topic [Module] Activity [Learning opportunity] Related Assessment


[Date/Ses CLO
sion]
Week 1 Module I Read materials introduction on CLO1
OSI Layer Protocols OSI Layer Protocols.

Week 2 Module I Read materials introduction on CLO1


Data Link layer Protocol Ethernet, LAN’s, IP protocol
[1][3] [4] [6]
Week 3 Module II Read material on Local Area CLO1
Local Area Network and Network and LAN Protocols
LAN Protocols
Week 4 Module II Discuss and understand Local CLO2
Local Area Network and Area Network and LAN Protocols
LAN Protocols
Module II Read material on IPv4, IPv6
Week 5 Local Area Network and Network layer protocols and CLO2
LAN Protocols more
Week 6 Module II Discuss and understand CLO2
Local Area Network and IPv4, IPv6 Network layer
LAN Protocols protocols
[2][3] [4] [6]
Week 7 Module III Read material on TCP, UDP, CLO3
Transport Layer protocols Transport layer protocols
Week 8 Module III Discuss and understand CLO3
Transport Layer protocols TCP, UDP, Transport layer
protocols and more
Week 9 Module IV Read material on CLO3
Application Layer Protocols Application Layer Protocols [3] [4] [6]

Week 10 Module IV Discuss various CLO4


Application Layer Protocols Application Layer Protocols

Week 11 Module IV Read material on WIFI, and CLO4


WIFI, and WIMAX Protocols WIMAX Protocols [4] [6]
Week 12 Module V Discuss various WIFI, and CLO4
WIFI, and WIMAX Protocols WIMAX Protocols

5. Assessment

5.1 Assessment tasks

Assessment task Length Weight Max Mark Due date

Assessment 1: Home Assignment-I 4 Week 10% 10 End of the 4th Week

Assessment 2: Home Assignment-II 4 Week 10% 10 End of the 8th Week

Assessment 3:Mid Term Exam/Quiz 9 Week 15% 15 End of the 9th Week

Assessment 4: Presentation 12 Week 10% 10 End of the 12th Week

Assessment 5: Attendance Daily 5% 5 As per the Amizone

Assessment 6:End Term Exam 3 Hrs 50% 50 End of the Session

* It is mandatory for maintain minimum 75 % attendance


• 95-100 % = 5 marks
• 90-94 % = 4 marks
• 85-89 % = 3 marks
• 80-84 % = 2 marks
• 75-79 % = 1 Marks
5.2 Assessment criteria and standards
5.2.1 Mid-Semester exams/ Quiz
It is an 1 Hr written exam. The course content will be first two/three modules. Mostly
logical subjective questions will be asked. Try to be specific and point to point in your
answers.
5.2.2 Case Study

Category/Scale Excellent Good (65 Average (45 Poor (<45)


(≥80) to <80) to <65)

Identify the Able to find Able to find Basic ability Inability to


relevant case appropriate appropriate to find the identify
case case case relevant
case

Reference Appropriate Adequate Superficial Lack of


Collection and information information information relevant
Compilation collection collected collected information
and detailed and good with collected
compilation compilation incomplete
compilation

Analysis and Exhaustive Clear Analyzed Irrelevant


Interpretation analysis with analysis and and analysis
appropriate presentation addressed
expression of the case to
ideas some extent

Link to Course Powerful Partly Relevant, Vague


and Research connection connected bot able to connection
with course with the make
reading and course and alignment
contemporary research
research

5.2.3 Presentation/ Flip Class

Category/Scale Excellent Good (65 Average (45 Poor (<45)


(≥80) to <80) to <65)
Content and Complied Relevant Partial Inadequate
Organization relevant contents, information information
information sequential
in ordering and
sequential but lack of organization
order with elaboration
adequate
elaboration

Delivery Confident Nicely Presented but Unfocused


and presented lack of delivery
enthusiastic and confidence
presentation addressed
the issue

Response to Addressed Addressed Partly No able to


queries the queries the queries addressed the understand
with queries queries
examples

5.2.4 Class Test/ End Term Exam

Category/Scale Excellent Good (65 Average (45 Poor (<45)


(≥80) to <80) to <65)

Address the Understood Nicely Addressed No reply/


question(s) with the addressed the problem irrelevant
relevant reply problem(s) the problem imprecisely reply
and replied
in
appropriate
manner
Organization Satisfactory Organized Partly Not
answer(s) and and the organized the completely
time relevant answer(s) problem addressed
management reply in the issue
stipulated
time
5.2.5 End term examination (University will conduct the same)

5.4 Rubrics for assignment


Criteria / Overall
8 or more 6 or more 3 or more 0-2
Score
Organization of The type of
The type of written The type of The type of
answers answer is just
answer is in exact answer is satisfactory and answer is not
[2 Marks] match with the appropriate for the short as per the suitable as per
question but
question. Answer topic. Answer is the question.
detailed
(diagram, coding, written in a logical description is Answer is not at
flowchart etc.) is manner but with missing. all satisfactory
written in a logical poor grammar, not as per the
and properly neat & having question.
structured sequence. spelling mistakes.
Student has used
technical terms while
answering.

Answer contains Appropriate length Satisfactory Answer is


accurate description of answers is description of the missing detailed
of the question asked partially missing answer is written information
and text included is without suitable without related to
relevant to the point and proper question.
Diagram, coding,
i.e. answer should diagram, coding,
flowchart,
not be lengthy and flowchart,
example, case
irrelevant. Answer example, case
study etc.
should not be copied study etc.
from fellow students.
Content Diagram, coding,
flowchart, example,
[2 Marks]
case study etc.
should be included
wherever necessary.
In case of numerical
question, the
accuracy of answer
and proper flow of
solution (formula,
equation etc.) must
be maintained.
Deadline Submission is done Submission is Submission is Assignment not
on or before deadline done next day of done within a at all submitted.
[2 Marks] given. deadline given but week after

9
prior intimation is deadline given
given by the but prior
student with a intimation is given
valid reason. by the student
with a valid
reason

All questions All questions Some questions No questions


answered with proper answered with answered without answered.
explanation. less explanation. explanation.
Student bears
Knowledge and Knowledge and Knowledge and no knowledge of
Learning by
assignment (viva- confidence level of confidence level of confidence level the assignment

voce from student is found high. student is found of student is given.

assignment) Proves that he/she good. found


has completed the average.
[2 Marks]
assignment by
themselves.

5.4 Rubrics for presentation


Criteria / Overall
8 or more 5 or more 2 or more 0-1
Score
The type of
The type of The type of The type of
presentation is
presentation is highly presentation is satisfactory for presentation is
suitable for the topic. appropriate for the the topic. not suitable as
Information is
Information is topic. Information per the topic.
presented in a
presented in a logical is presented in a logical but No logical or
and properly logical but poorly unstructured structural
sequence.
structured sequence. structured sequence is
Organization Introduction is
Introduction is sequence. found.
defined with
[2 Marks] attention-getting, lays Introduction is No Introduction
improper lays out
out the problem well clearly defined is found. The
and unframed
and with proper lays problem is not
Framework of the
Establishes a out having well established
presentation.
framework for the unframed and framework
rest of the framework of the Technical terms is not defined.
presentation. presentation are defined but
Technical terms
Technical terms are inappropriate for
Technical terms are missing.
well-defined in the target
are well-defined in
language appropriate audience.
language less
for the target
10
audience. appropriate for the
target audience.

Presentation contains Appropriate Satisfactory Material is


accurate information amount of material explanation of the missing with no
and is prepared, and content is information
points made prepared with related to
Material included is
less importance. content.
relevant to the overall reflect well their
message/purpose. partial importance.
There is well-defined Defined
Content
conclusion and conclusion and
[2 Marks] summarizing of the summarizing of
presentation. the presentation

Not properly No conclusion


defined and
conclusion and summarization
summarizing of of the
the presentation presentation
Speaker maintains Speaker maintains Speaker No eye contact
good eye contact appropriate eye maintains less of the Speaker
with the audience contact with the eye contact with with the
and is audience and is the audience and audience and
partially animated. Speaker uses a improper body
appropriately
Speaker uses a unclear, audible language.
animated (e.g.,
clear, audible voice.
gestures, moving Poor in Delivery
voice.
around, etc.). Delivery is and improper
Presentation
partially language skills.
Speaker uses a
[2 Marks] controlled, and
clear, audible voice. Delivery is
clear. Language
controlled, and
skills and
smooth. Good
Delivery is poised, pronunciation are
language skills
controlled, and used.
and pronunciation
smooth. Excellent are used.
language skills and
pronunciation are
used.
Length of Length of Presentation is Presentation
presentation is within presentation is finished before and information
the assigned time exceeding the the assigned time is missing.
limits. Information assigned time limits. Information
Presentation not
was well limits. Information was not properly
cited as well as
communicated. was communicated.
Overall Impression references are
communicated.
Presentation missing.
[2 Marks] appropriately cites Presentation
Presentation not
requisite number of appropriately cites
appropriately
references. but less requisite
cites and does
number of
not show proper
references.
number of
references.

11
All queries answered All queries Some queries No queries
with proper answered with answered without answered

Response To explanation less explanation explanation


No Knowledge
Queries Knowledge and Knowledge and Knowledge and
[2 Marks] confidence level high confidence level confidence level
good average

5.6 Submission of assessment tasks


Assignments are to be submitted in time. No delay will be tolerated. Assignment submission date can
be extended only in case of special consideration. The assignment can be prepared in MS-Word. The
assignment must be in specified format (PDF) and should be submitted on or before due date. The
assignment submitted after the due date will be entitled for negative marking.

5.7 Feedback on assessment


Feedback on improvement of the assessment will be given to the students after evaluation of the
assessment. The immediate class after the evaluation will be used for the discussion and feedback.

6. Academic integrity, referencing and plagiarism


Students will be encouraged to have high level academic integrity while submitting/presenting any
assigned work. Also, their work will be rescanned by plagiarism software and faculty board.

7. Readings and resources

• Jawin: “Networks Protocols Handbook”, 3rd Edition, Jawin Technologies Inc., 2005.

• Bruce Potter and Bob Fleck : “802.11 Security”, 1st Edition, O‟Reilly Publications, 2002.
• Ralph Oppliger :“SSL and TSL: Theory and Practice”, 1st Edition, Arttech House, 2009.

• Lawrence Harte: “Introduction to CDMA- Network services Technologies and Operations”, 1st
Edition, Althos Publishing, 2004.

• Lawrence Harte: “Introduction to WIMAX”, 1st Edition, Althos Publishing, 2005.

8. Administrative matters

• All the information are available at Director Office, Amity Institute of


Information Technology (AIIT)
• https://amizone.net

9. Additional support for students

• School AIIT, Block E, AUR


• Student Wellbeing, Health and Safety: https://amizone.net/
12
• Disability Support Services: https://amizone.net/
• Amity IT Service Centre: https://amizone.net/

13

You might also like