Distinguished Visitors Program (India)
LECTURES CONDUCTED BY DVP (INDIA)
YEAR 2001-2002
LECTURE 1
Speaker :
Prof. Sivakumar,
IIT Bombay
Topic :
Internet Security and Cryptographic Protocols
Date :
27th May 2002
Venue :
Curtin University of Technology, Perth
Abstract :
Internet's uncontrolled growth, and the increasing dependence on it
by many commercial organizations, has made
it a very critical but also a very vulnerable infrastructure. In this
talk, we will start with an overview of security requirements (such as
privacy, integrty, authenticity), threats (sniffing, spoofing, denial
of services) and vulnerabilities (virus, Trojan Horse, buffer
overflows). We will then separate the three main components of
security--- Data security, System security and Transmission/Network
Security and present useful defence mechanisms used at each layer.
At the heart of most defence mechanisms are Cryptographic protocols, which are
security related interactions for reaching agreement between two or more
principals, for example for authentication and key distribution. Such
protocols are usually described by alternate transmission and receipt of
(encrypted) messages in pre-defined format and sequence between principals.
We will conclude by introducing several logics that have been proposed to model
cryptographic protocols and corresponding proof techniques used to prove
properties of the protocol such as vulnerability to attack by interception or
spoofing of messages.
LECTURE 2
Speaker :
Prof. Sivakumar,
IIT Bombay
Topic :
Internet Security and Cryptographic Protocols
Date :
28th May 2002
Venue :
University of Adelaide, Adelaide
LECTURE 3
Speaker :
Prof. Sivakumar,
IIT Bombay
Topic :
Internet Security and Cryptographic Protocols
Date :
30th May 2002
Venue :
RMIT, Melbourne
LECTURE 4
Speaker :
Prof. Sivakumar,
IIT Bombay
Topic :
Internet Security and Cryptographic Protocols
Date :
30th May 2002
Venue :
University of Technolgy, Sydney
LECTURE 5
Speaker :
Prof. Sivakumar,
IIT Bombay
Topic :
Formal Methods for Verification of Real-time Reactive Systems
Date :
5th June 2002
Venue :
University of Auckland, Auckland, NZ
Abstract :
Many applications such as computer based control systems used in nuclear
reactors, space, avionics, process-control and robotics are safety-critical.
Dramatic examples of catastrophic consequences of even minor bugs in such
applications are many, including well known ones such as Ariane 5 failure,
Mars Path finder problem and the Pentium bug.
This talk will start with a broad survey of the issues and state of the art
in the verification of real-time reactive systems using examples from the work
being done at the Centre for Formal Design and Verification of Software at IIT
Bombay. We will then focus on the need for inductive proofs and introduce how
equational logic and rewrite systems are particularly suited for this. We will
conclude with illustrative examples of proofs of properties of some
communication and security protocols using equational methods.
LECTURE 6
Speaker :
Prof. Sivakumar,
IIT Bombay
Topic :
Internet Security and Cryptographic Protocols
Date :
5th June 2002
Venue :
Canterbury University, Christchurch, New Zealand
LECTURE 7
Speaker :
Prof. Sivakumar,
IIT Bombay
Topic :
Formal Methods for Verification of Real-time Reactive Systems
Date :
5th June 2002
Venue :
Canterbury University, Christchurch, New Zealand
LECTURE 8
Speaker :
Mr. R. Muralidharan, SMIEEE, OSS Systems (India) Pvt. Ltd., Mumbai, India
Topic :
Integrated Access for Optical Networks : Issues and Challenges
Date :
14th August 2002
Venue :
IEEE Victoria Section, Canada
Abstract :
Integrated access for various services at the edge of an optical network, including issues and
challenges involved are discussed. Optical networking is a technology for carrying very high
volumes of data, voice, video services etc on multiple wavelengths of light. While the voice
traffic is characterized by predictable growth and low-bandwidth requirements, data traffic
has shown unpredictable growth and high bandwidth requirements. The Internet, private IP
networks and other data intensive applications have shown exponential growth. This has
increased the demand for high-speed capacity within the network. The data network traffic
doubling every 6 months, service providers have expanded their networks fourfold over the
last four years, whereas long-distance providers have grown their networks by seven times.
Much of the added capacity has been in optical networking. With the rapid growth of first
generation data networks, such as Frame Relay, IP and ATM, the underlying SONET/SDH
network has served as the transmission medium for overlay data traffic as well as voice. At
the edge of the optical network, SONET/SDH network equipment act as integrated access
devices (IAD) and groom multiple low-speed data/voice/video circuits into a single
highspeed optical stream. With extensive management functionality built into the protocol,
SONET/SDH is the layer that today provides the service creation, fault management and
restoration capabilities. One of the important points in optical networking is to convert
data/voice into optical format as early as possible, at the edge of the network, and keep it
optical as it passes through the network. Inherently, the SONET/SDH architecture is
designed for voice traffic and hence there are many issues related to providing integrated
services in the optical network. Issues such as Quality of service (QoS), bandwidth
provisioning, dynamic provisioning, wire speed data processing, differentiated services etc
need to be addressed. Hardware software co-design methodology is best suited for realizing
such hard real time systems that need to operate at wire speed for data rates reaching gigabits. Aggregation of data channels involve processing incoming channel packets and encapsulating
them into PPP/MP frames in real time. The payload received from the optical side needs to
be demultiplexed and mapped onto an appropriate slow speed interface. The Access systems
are designed to be Managed objects and they can be managed by a global Network Manager
such as HP Open View. For this the access nodes need to have SNMP/CMIP agents as well
as SONET DCC with TL1 stacks. The architecture of the system with appropriate delegation
of tasks to achieve real time data transport at Gigabit speeds is a challenge.