MSc in Electrical Engineering

Course Information Package

Course Unit TitleMOBILE AND WIRELESS NETWORK SECURITY
Course Unit CodeAEEE578
Course Unit DetailsPhD Computer Science (Postgraduate level courses) - MSc Electrical Engineering (Technical Electives) - PhD Electrical Engineering (Postgraduate level courses) -
Number of ECTS credits allocated7
Learning Outcomes of the course unitBy the end of the course, the students should be able to:
  1. Explain the underlying principles of network security in wireless technologies.
  2. Describe the operation of cryptographic algorithms and protocols underlying network security applications in mobile systems.
  3. Develop the ability to design and analyze authentication protocols.
  4. Discuss the issue of key management and routing in mobile wireless networks.
  5. Describe the current Web technologies security mechanisms, their attacks and countermeasures.
  6. Develop sufficient knowledge to protect Web applications.
Mode of DeliveryFace-to-face
PrerequisitesNONECo-requisitesNONE
Recommended optional program componentsNONE
Course Contents

         Introduction to Security: Security properties, attacks and threats categories, security design at various network layers

         Cryptography: Symmetric and asymmetric encryption; secure hash functions, Digital signatures, key management

         Access control:  authentication, design of authentication protocols, applications (Kerberos, public key infrastructure), certificates management, CRLs management, authorization

         WEB application security: Web Security (Secure Socket Layer (SSL) and Transport Layer Security (TLS), Open Web Application Security Project (OWASP) Top 10 attacks and countermeasures

         Security in wireless networks technologies: 802.11 (Wi-Fi) Security,WPA and 802.11i (WPA, EAPOL, EAP, RADIUS), 802.1x protocol packet structure and operation, WPAN (802.15 / Bluetooth), WiMax 802.16, GSM, 3G, UMTS,

         Security in Ad Hoc networks  and wireless sensor networks: secure routing in wireless environment, thwarting malicious and selfish behavior in wireless environments, key management in wireless environment,        Key management protocols over wireless devices (WPA/RSN, TKIP, AES-CCMP)

         Security Management

         Future Developments

Recommended and/or required reading:
Textbooks
  • "Security and Cooperation in Wireless Networks" by Levente Buttyan and Jean-Pierre Hubaux, 2007
  • “Implementing 802.1X Security Solutions for Wired and Wireless Networks”, Jim Geier, 2008
References
  • “Security In Wireless LANS And MANS,” Thomas Hardjono, Lakshminath R. Dondeti , 2005
  • “Real 802.11 Security : Wi–Fi Protected Access and 802..11i” Jon Edney, William A. Arbaugh,2003
  • “Security for Ubiquitous Computing,” Frank Stajano , June 15, 2002
  • W. Stallings, “Network Security Essentials: Applications and Standards”, Prentice Hall, 3rd Ed., 2007, ISBN 0-13-238033-1.
  • M. Bishop, “Intro to Computer and Network Security”, 2005
  • Kaufman, Perlman, “Network security: Private communication in a public world”
  • C.P. Pfleeger and S.L. Pfleeger, “Security in Computing”, Prentice Hall, 4th Ed., 2007, ISBN 0-13-239077-9.
  • W. Stallings and L. Brown, “Computer Security: Principles and Practice”, Prentice Hall, 1st Ed., 2008, ISBN 0-13-600424-5.
  • An extensive reading list of relevant academic research papers.
Planned learning activities and teaching methods

The taught part of course is delivered to the students by means of lectures, conducted with the help of computer presentations. Lecture notes and presentations are available through the web for students to use in combination with the textbooks. Furthermore theoretical principles are explained by means of specific examples and solution to specific problems.

Lectures are supplemented with unsupervised computer laboratory and homework where students apply their gained knowledge and identify the principles taught in the lecture sessions.

The course will also utilize research paper analysis and presentation allowing students to gain knowledge on the state of the art on specific security topics.

Assessment methods and criteria
Paper presentation10%
Project work20%
Test30%
Final Exam40%
Language of instructionEnglish
Work placement(s)NO