Veranstaltung: Wireless Security

Nummer:
148216
Lehrform:
Vorlesung und Übungen
Medienform:
rechnerbasierte Präsentation
Verantwortlicher:
Prof. Dr. Christina Pöpper
Dozent:
Prof. Dr. Christina Pöpper (ETIT)
Sprache:
Englisch
SWS:
4
LP:
5
Angeboten im:

Prüfung

Termin nach Absprache mit dem Dozenten.

Prüfungsform:mündlich
Prüfungsanmeldung:Direkt bei der Dozentin bzw. dem Dozenten
Dauer:30min

Ziele

Communication services and applications are increasingly leveraging the wireless medium. Given this development, the importance of information and network security in the wireless domain grows. Providing secure communication and network services in wireless environments creates challenges that often differ considerably from traditional wired systems.

The students are able to describe, classify, and assess security goals and attacks on wireless communication and in wireless networks. The students are able to describe the security architectures of different wireless systems and networks, in particular 802.11, GSM/UMTS, RFID, ad hoc and sensor networks. They will are able to reason about security protocols for wireless networks and can implement certain mechanisms to secure them.

Inhalt

The focus of this course are wireless environments such as wireless ad hoc, mesh, and sensor networks. Central elements of the course are the wireless communication channel, wireless network architectures and protocols. We will focus on the vulnerabilities, attack mechanisms as well as detection, protection and prevention techniques in wireless networks.

The course starts with wireless fundamentals and wireless channel basics. This includes jamming and modification attacks and respective countermeasures. It will then cover basic security protocols and protection mechanisms in cellular, WiFi and multi-hop networks. This will be followed by recent advances in the security of multi-hop networks. The considered techniques include security in off-the-shelf wireless technologies (such as WiFi, WiMAX, Mobile Telecommunication, RFID, Bluetooth) and in emerging wireless technologies (security in ad-hoc networks, key management, sensor networks).

Voraussetzungen

none

Empfohlene Vorkenntnisse

Knowledge of the course contents of Sys­tem­si­cher­heit, Netz­si­cher­heit, and Com­pu­ter­net­ze can be beneficial.

Sonstiges

The biweekly exercise sessions are of hands-on nature.