T. Andrew Yang

Email: yang@uhcl.edu

Web page:  http://sce.uhcl.edu/yang/

Tel.: (281) 283-3835

Last updated:



CSCI5931-04 Research Topic

Wireless and Sensor Networks

Spring 2007  (1/16-4/30 + final week)


Lecture Notes & Schedule
- Print and bring the lecture notes to the class.


Assignments / Projects

Office Hours

Important!  To be accepted into the discussion group, make sure you use your full name as your yahoo id.

  • Resources, etc.:

How to cite published work in your papers?

Important! Read the above before writing your papers or reports.


To obtain articles from the ACM Digital Library or the IEEE Xplore:

Use any of the lab computers in the campus to download the articles from http://www.acm.org/dl  or http://ieeexplore.ieee.org/xpls/VSearch.jsp.  Note: The links may not work outside the campus unless you've got your own digital library subscription from either site.

Time (Classroom):

Wedn. 10am - 12:50pm  (D242)

Prerequisite:   CSCI4132 (Network Protocols) and CSCI5233 (Computer Security and Integrity), or instructor’s approval.

Course Objectives:    This course provides an essential study of issues and methods in wireless and sensor networks, which are composed of either fixed or mobile devices employing various wireless communication schemes.  Topics to be covered include overview of wireless networking protocols (IEEE 802.11, 802.15, 802.16, GPRS, CDMA, etc.), the basics of wireless sensor networks (WSN), and various topics related to WSN, including protocols, services, applications, sensor programming, key management, and WSN security issues (such as privacy, integrity, authentication, secure localization, secure aggregation, attacks and defense mechanisms).

Class Format:  Lectures are combined with discussions and, if applicable, student presentations and discussions of advanced topics.  Students are expected to be active participants, by studying the relevant chapters and/or research papers and participating at in-class discussions. 

To enhance students’ understanding of wireless sensor networks (WSN), hand-on programming projects using sensor network simulators and commercial WSN devices (such as those manufactured by the Crossbow, Inc.) to develop sensor applications will be included in the course. Students are expected to make oral presentations of topics related to wireless sensor networks.

Instructor:   Dr. T. A. Yang 

  • (office) Delta 106
  • Office hours (NOTE: If the suite office is locked, you may use the phone outside the office to call me, by entering the extension 3835).

You are highly encouraged to send your questions to me by e-mails or by posting the question to the discussion group. You, however, are responsible for clearly describing the problem(s) you have encountered, the solution(s) you have tried, and the outcome you have got from these solution(s).

  • (phone#) (281) 283-3835 (Please leave a message if not available.)
  • (email address) yang@uhcl.edu (Note: Emails without a proper subject line and your full name will be discarded.   Here is a sample subject line: "CSCI 5931 project #1, question 1".
  • (web site)  http://sce.uhcl.edu/yang/

Required Text: No textbook is required. Instead of a textbook, a set of selected research papers and online resources will be used as the fundamental study materials in this course. See the References page for a list of papers and resources.


Topics, Notes &  Schedule

  • The due dates are fixed and will not be extended, unless specifically announced.  Start your work early!
  • The topics column is subject to change when the class moves on.  Check with the instructor if you have doubt concerning the teaching schedule.

wk (dates)

Topics: papers

Due Dates

1 (1/16)

Syllabus, projects, presentations, etc.
Introduction to Wireless Networks slides

-          Wireless network (from Wikipedia, the free encyclopedia) http://en.wikipedia.org/wiki/Wireless_network

-          O’Reilly’s Wireless Developer Center: http://www.oreillynet.com/wireless/

-          Roy, Srijeeb. “Push messages that automatically launch a Java mobile application - Add MIDP 2.0's push registry feature to your device application”. JavaWorld.com. 04/17/06. http://www.javaworld.com/javaworld/jw-04-2006/jw-0417-push.html

-          Knudsen, Jonathan and Sing Li. “Beginning J2ME: Building MIDlets - Get a taste of MIDlet development”. JavaWorld.com. 05/02/05. http://www.javaworld.com/javaworld/jw-05-2005/jw-0502-midlet.html


2  (1/23)

Wireless LAN

-          Zahur, Y. and Yang, T. A. “Wireless LAN Security and Laboratory Designs,” Journal of Computing in Small Colleges. Volume 19 Issue 3. Jan. 2004. local copy slides


3 (1/30)

Basics of WSN

-          Brain, Marshall. “How Motes Work?” http://computer.howstuffworks.com/mote.htm/printable.

-          Wireless network (from Wikipedia) http://en.wikipedia.org/wiki/Sensor_network

-          Tran, Sam Phu Manh, and T. Andrew Yang. “Evaluations of Target Tracking Methods in Wireless Sensor Networks”, Proceedings of the 37th ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE 2006). Houston, Texas. 3/1-5, 2006. local copy

-          Tran, Sam Phu Manh, and T. Andrew Yang. “OCO: Optimized Communication & Organization for Target Tracking in Wireless Sensor Networks”. Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2006). Taichung, Taiwan. 6/5-7, 2006. (local copy) slides

Selection of papers for oral presentations (Send it to yang@uhcl.edu.)

4 (2/7)



5 (2/14)

Sensor Network Programming

-          TinyOS and Sensor application development using Crossbow sensor products slides (Aiyaz)


6 (2/21)

-          Developing wireless sensor applications using the OMNET++ network simulator slides (Saurav)

Intro. to OMNET++ development

OMNET++ tutorial


7 (2/28)

WSN Protocols 1

-          Karlof, C., and D. Wagner,” Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, May 11, 2003. local copy slides (Sarjana)

-          Liu, C., K. Wu, Y. Xiao, and B. Sun, "Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 6, June 2006, pp. 562-575. local copy slides (Saurav)

project 1

8 (3/7)

Midterm exam


9 (3/14)

Spring holidays! No class meeting.


10 (3/21)

Presentation of the project abstract


WSN Protocols 2

-          Karlof, C., N. Sastry, and D. Wagner, “TinySec: a Link Layer Security Architecture for Wireless Sensor Networks,” Proceedings of the 2nd international conference on Embedded networked sensor systems (ACM SenSys’04), Baltimore, MD, USA, pp. 162 - 175. local copy slides  (Sarjana)

Abstract of the final report (Send it to yang@uhcl.edu.)

11 (3/28)

Presentation of the project abstracts

-          Key Management in Wireless Sensor Networks  ppt (Hari)

-          Energy Efficient communication in Wireless and Sensor Networks  ppt (Sarjana)

-          Reorganization of Sensor Nodes in OCO  ppt (Aiyaz)

-          Modeling and Simulation of WSN for Target Traking  ppt  (Saurav)


WSN Services and Applications

-          Zhou, Ying and Debao Xiao. “Mobile agent-based policy management for wireless sensor networks”. Proceedings of the 2005 International Conference on Wireless Communications, Networking and Mobile Computing, Volume 2, 1207 – 1210. 23-26, Sept. 2005. local copy slides  (Saurav)


Wireless attacks and defending mechanisms

-          Sun, B., F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, “Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks”, IEEE Tran. on Vehicular Tech., Vol. 55, No. 3, May 2006. local copy slides (Hari)

project 2

Abstract of the investigation report (Send it to yang@uhcl.edu.)

12 (4/4)

-          Wood, A.D., and J. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer, (Oct. 2002), 54-62. local copy slides (Aiyaz)

-          McCune, J.M., E. Shi, A. Perrig, M.K. Reiter, “Detection of Denial-Of-Message Attacks on Sensor Network Broadcasts,”, Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 2005, pp. 64-78. local copy slides (Hari)

project 2

13 (4/11)

WSN Key Management

-          Eschenauer, L., and V. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proceedings of ACM Conference on Computer and Communications Security (ACM CCS), Washington DC, pp. 41-47, 2002. local copy slides (Aiyaz)

-          Du, W., J. Deng, Y. Han, and P. Varshney, “A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,” ACM Transactions on Information and System Security (TISSEC), vol. 8, issue 2, pp. 228-258, 2005. local copy slides

project 3

14 (4/18)

WSN Privacy, Integrity and Authentication

-          Zhu, S., S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data Injection in Sensor Networks,” IEEE Symposium on Security and Privacy, Oakland, CA, May 9-12, 2004, pp. 260-272. local copy slides

Secure Localization

-          Lazos, L., and R. Poovendran, “SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks”, Proceedings of 2004 ACM Workshop on Wireless Security (ACM WiSe), Philadelphia, PA, Oct. 2004, pp. 21-30. local copy slides

Secure Aggregation

-          Wu, K., D. Dreef, B. Sun, and Y. Xiao, “Secure Data Aggregation without Persistent cryptographic operations in Wireless Sensor Networks,” Elsevier AD HOC Networks journal, special issue on Security Issues in Sensor and ADHOC Networks, accepted and to appear, 2006. local copy slides

project 3

15 (4/25)

Final report presentation and discussion

Final report (Send it to yang@uhcl.edu.)


Computer Labs & Hours

The NT Lab (Delta 119) is equipped with computers that have been properly configured to run Java applications requiring JCE and JDK.


Check http://sce.uhcl.edu/computing.asp for lab information, open hours, FAQs, etc.











final report


NOTE:  The accumulated points from all the categories determine a person's final grade. There will be no extra-credit projects.

Grading Scale:




93% or above


S90% - 92%


87% - 89%


84% - 86%


80% - 83%


77% - 79%


74% - 76%


70% - 73%




59% or below



Both analytic and synthetic abilities are emphasized. Being able to apply the learned knowledge toward problem solving is also highly emphasized in the tests. 

Assignments/Projects and Late Penalty:

Assignments and projects will be posted at the class web site. Assignments & projects are due before the beginning of the class on the due day.  See Topics and Notes for the due dates. 

Points will be deducted from late assignments: 20% for the first 24 hours after the due time, 40% for the next 24 hours, 70% for the third 24 hours, and 100% after that. No extension will be granted except for documented emergency.   Starting to work on the assignments as early as possible is always the best strategy.

NOTE: Unless otherwise specified, all assignments and projects are individual work.  Students should take caution not to violate the academic honesty policies.  See http://b3308-adm.uhcl.edu/PolicyProcedures/Policy.html for details of the University policies.

Assignments/Projects Guidelines:

  • Identification page: All assignments must have your name, and course name/number/section number (e.g., CSCI234-01 or CSCI5333-03) at the top of the first page.
  • Proper stapling:  Staple all the pages together at the top-left corner. NOTE: Do not use paper clips.
  • Order! Order!  Arrange the solutions following the sequence of the questions. Write the question number at the top-right corner of each page.
  • Word  processing:  It is required that you type your reports (e.g., print them using a printer). Use a word processor and appropriate typesetting and drawing tools to do the assignments.
  • Check the spelling and the grammar for the whole document before handing it in. You may loose points due to spelling or grammatical errors.
  • Use proper commenting and structure in your programs.


The projects will involve the design and implementation of a secure N-tier web based application demonstrating the development of a secure Java online application using various technology.  Students are expected to employ the theories and techniques learned in the class to design and implement the system.  

Attendance Policy:

You are expected to attend all classes. If you ever miss a class, it is your responsibility to get hold of whatever may have been discussed in that class.

Instructor's Notes:

  • Unless due to unexpected, documented emergency, no make-up exams will be given.  No make-up exams will be granted once the exams have been corrected and returned to the class. 
  • Important:   If you think you have lost some points due to grading errors, make sure you approach the instructor within a week after the assignment, project, or test is returned to you.  
  • To get the most out of this class, you need to read the textbooks and spend time using computers regularly.  Be prepared for a class by preview the material to be covered in that class and participate in discussions and problem-solving exercises, if applicable, in the class.
  • Due to the intensive nature of graduate classes, 15-20 hours per week are expected of students in studying the textbook/notes and working on the assignments, in addition to class attendance.   Expect to spend more hours during summer sessions.

Go to the  Index

  Main Page



o        Office hours


o        Active projects

o        Research interest

o        Publications

o        Presentations

o        Grants


o        Student support

o        Committees

o        Curricular development

o        Centers

    Other Links