course: Wireless Security

teaching methods:
lecture with tutorials
computer based presentation
responsible person:
Prof. Dr. Christina Pöpper
Prof. Dr. Christina Pöpper (ETIT)
offered in:


All statements pertaining to examination modalities (for the summer/winter term of 2020) are given with reservations. Changes due to new requirements from the university will be announced as soon as possible.

Date according to prior agreement with lecturer.

Form of exam:oral
Registration for exam:Directly with the lecturer


Communication services and applications are increasingly leveraging the wireless medium. Given this development, the importance of information and network security in the wireless domain grows. Providing secure communication and network services in wireless environments creates challenges that often differ considerably from traditional wired systems.

The students are able to describe, classify, and assess security goals and attacks on wireless communication and in wireless networks. The students are able to describe the security architectures of different wireless systems and networks, in particular 802.11, GSM/UMTS, RFID, ad hoc and sensor networks. They will are able to reason about security protocols for wireless networks and can implement certain mechanisms to secure them.


The focus of this course are wireless environments such as wireless ad hoc, mesh, and sensor networks. Central elements of the course are the wireless communication channel, wireless network architectures and protocols. We will focus on the vulnerabilities, attack mechanisms as well as detection, protection and prevention techniques in wireless networks.

The course starts with wireless fundamentals and wireless channel basics. This includes jamming and modification attacks and respective countermeasures. It will then cover basic security protocols and protection mechanisms in cellular, WiFi and multi-hop networks. This will be followed by recent advances in the security of multi-hop networks. The considered techniques include security in off-the-shelf wireless technologies (such as WiFi, WiMAX, Mobile Telecommunication, RFID, Bluetooth) and in emerging wireless technologies (security in ad-hoc networks, key management, sensor networks).



recommended knowledge

Knowledge of the course contents of Sys­tem­si­cher­heit, Netz­si­cher­heit, and Com­pu­ter­net­ze can be beneficial.


The biweekly exercise sessions are of hands-on nature.