course: Wireless Security
- number:
- 148216
- teaching methods:
- lecture with tutorials
- media:
- computer based presentation
- responsible person:
- Prof. Dr. Christina Pöpper
- lecturer:
- Prof. Dr. Christina Pöpper (ETIT)
- language:
- english
- HWS:
- 4
- CP:
- 5
- offered in:
Exam
All statements pertaining to examination modalities (for the summer/winter term of 2020) are given with reservations. Changes due to new requirements from the university will be announced as soon as possible.
Date according to prior agreement with lecturer.
Form of exam: | oral |
Registration for exam: | Directly with the lecturer |
Duration: | 30min |
goals
Communication services and applications are increasingly leveraging the wireless medium. Given this development, the importance of information and network security in the wireless domain grows. Providing secure communication and network services in wireless environments creates challenges that often differ considerably from traditional wired systems.
The students are able to describe, classify, and assess security goals and attacks on wireless communication and in wireless networks. The students are able to describe the security architectures of different wireless systems and networks, in particular 802.11, GSM/UMTS, RFID, ad hoc and sensor networks. They will are able to reason about security protocols for wireless networks and can implement certain mechanisms to secure them.
content
The focus of this course are wireless environments such as wireless ad hoc, mesh, and sensor networks. Central elements of the course are the wireless communication channel, wireless network architectures and protocols. We will focus on the vulnerabilities, attack mechanisms as well as detection, protection and prevention techniques in wireless networks.
The course starts with wireless fundamentals and wireless channel basics. This includes jamming and modification attacks and respective countermeasures. It will then cover basic security protocols and protection mechanisms in cellular, WiFi and multi-hop networks. This will be followed by recent advances in the security of multi-hop networks. The considered techniques include security in off-the-shelf wireless technologies (such as WiFi, WiMAX, Mobile Telecommunication, RFID, Bluetooth) and in emerging wireless technologies (security in ad-hoc networks, key management, sensor networks).
requirements
none
recommended knowledge
Knowledge of the course contents of Systemsicherheit, Netzsicherheit, and Computernetze can be beneficial.
miscellaneous
The biweekly exercise sessions are of hands-on nature.