course: Wireless Security

number:
148216
teaching methods:
lecture with tutorials
media:
computer based presentation
responsible person:
Prof. Dr. Christina Pöpper
lecturer:
Prof. Dr. Christina Pöpper (ETIT)
language:
english
HWS:
4
CP:
5
offered in:

Exam

Oral

Date according to prior agreement with lecturer.

Duration: 30min
Exam registration: Directly with the lecturer

goals

Communication services and applications are increasingly leveraging the wireless medium. Given this development, the importance of information and network security in the wireless domain grows. Providing secure communication and network services in wireless environments creates challenges that often differ considerably from traditional wired systems.

The students are able to describe, classify, and assess security goals and attacks on wireless communication and in wireless networks. The students are able to describe the security architectures of different wireless systems and networks, in particular 802.11, GSM/UMTS, RFID, ad hoc and sensor networks. They will are able to reason about security protocols for wireless networks and can implement certain mechanisms to secure them.

content

The focus of this course are wireless environments such as wireless ad hoc, mesh, and sensor networks. Central elements of the course are the wireless communication channel, wireless network architectures and protocols. We will focus on the vulnerabilities, attack mechanisms as well as detection, protection and prevention techniques in wireless networks.

The course starts with wireless fundamentals and wireless channel basics. This includes jamming and modification attacks and respective countermeasures. It will then cover basic security protocols and protection mechanisms in cellular, WiFi and multi-hop networks. This will be followed by recent advances in the security of multi-hop networks. The considered techniques include security in off-the-shelf wireless technologies (such as WiFi, WiMAX, Mobile Telecommunication, RFID, Bluetooth) and in emerging wireless technologies (security in ad-hoc networks, key management, sensor networks).

requirements

none

recommended knowledge

Knowledge of the course contents of Sys­tem­si­cher­heit, Netz­si­cher­heit, and Com­pu­ter­net­ze can be beneficial.

miscellaneous

The biweekly exercise sessions are of hands-on nature.