Course Details
Course Information Package
Course Unit Title | MOBILE AND WIRELESS NETWORK SECURITY | ||||||||||
Course Unit Code | AEEE578 | ||||||||||
Course Unit Details | |||||||||||
Number of ECTS credits allocated | 7 | ||||||||||
Learning Outcomes of the course unit | By the end of the course, the students should be able to:
| ||||||||||
Mode of Delivery | Face-to-face | ||||||||||
Prerequisites | NONE | Co-requisites | NONE | ||||||||
Recommended optional program components | NONE | ||||||||||
Course Contents | � Introduction to Security: Security properties, attacks and threats categories, security design at various network layers
� Cryptography: Symmetric and asymmetric encryption; secure hash functions, Digital signatures, key management
� Access control: authentication, design of authentication protocols, applications (Kerberos, public key infrastructure), certificates management, CRLs management, authorization
� WEB application security: Web Security (Secure Socket Layer (SSL) and Transport Layer Security (TLS), Open Web Application Security Project (OWASP) Top 10 attacks and countermeasures
� Security in wireless networks technologies: 802.11 (Wi-Fi) Security,WPA and 802.11i (WPA, EAPOL, EAP, RADIUS), 802.1x protocol packet structure and operation, WPAN (802.15 / Bluetooth), WiMax 802.16, GSM, 3G, UMTS,
� Security in Ad Hoc networks and wireless sensor networks: secure routing in wireless environment, thwarting malicious and selfish behavior in wireless environments, key management in wireless environment, Key management protocols over wireless devices (WPA/RSN, TKIP, AES-CCMP)
� Security Management
� Future Developments
| ||||||||||
Recommended and/or required reading: | |||||||||||
Textbooks |
| ||||||||||
References |
| ||||||||||
Planned learning activities and teaching methods | The taught part of course is delivered to the students by means of lectures, conducted with the help of computer presentations. Lecture notes and presentations are available through the web for students to use in combination with the textbooks. Furthermore theoretical principles are explained by means of specific examples and solution to specific problems.
Lectures are supplemented with unsupervised computer laboratory and homework where students apply their gained knowledge and identify the principles taught in the lecture sessions.
The course will also utilize research paper analysis and presentation allowing students to gain knowledge on the state of the art on specific security topics.
| ||||||||||
Assessment methods and criteria |
| ||||||||||
Language of instruction | English | ||||||||||
Work placement(s) | NO |