You are on page 1of 7

L, T, P, J, C

Subject Code: WIRELESS AND MOBILE SECURITY


2, 0, 0, 4, 3
Objectives  To learn about securing wireless networks
 Identify and analyze various the security issues in wireless mobile
communication
 To learn various issues of application level security in wireless
environment and its related solution
Expected Outcome  After successfully completing the course the student should be able to
 Familiarize with the issues and technologies involved in designing a
wireless and mobile system that is robust against various attacks.
 Gain knowledge and understanding of the various ways in which wireless
networks can be attacked and tradeoffs in protecting networks.
 Attain a broad knowledge of the state-of-the-art and open problems in
wireless and mobile security
Student Learning  Having a clear understanding of the subject related concepts and of
Outcome contemporary issues
 Having problem solving ability-solving social issues and engineering
problems

Module Topics L Hrs SLO


Security Issues in Mobile Communication: Mobile
1 Communication History, Security – Wired Vs Wireless, Security 3 2
Issues in Wireless and Mobile Communications
Security of Device, Network, and Server Levels: Mobile Devices
Security Requirements, Mobile Wireless network level Security,
2 Server Level Security. 2,9
Application Level Security in Wireless Networks: Application of 6
WLANs, Wireless Threats, Security for 2G Wi-Fi Applications,
Recent Security Schemes for Wi-Fi Applications
Application Level Security in Cellular Networks: Generations of
3 Cellular Networks, Security Issues and attacks in cellular networks, 5 2,9
GSM,GPRS and UMTS security for applications, 3G security for
applications.
Application Level Security in MANETs: MANETs, applications of
4 MANETs, MANET Features, Security Challenges in MANETs, Security 3 2,9
Attacks on MANETs.
Application Level Security in Ubiquitous Networks:
5 Ubiquitous Computing, Need for Novel Security Schemes for UC, 3 2,9
Security Challenges for UC
Application Level Security in Heterogeneous Wireless
6 Networks: 3 2,9
Heterogeneous Wireless network architecture, Heterogeneous
network application in disaster management, Security problems
and solutions in heterogeneous wireless networks.
Wireless Sensor Network Security
Attacks on wireless sensor networks and counter measures –
7 Prevention mechanisms: authentication and traffic protection – 5 2,9
centralized and passive intruder detection – decentralized intrusion
detection
8 Recent trends 2 2,9

30
Project 60 [Non 17
Contact
 Generally a team project [2 to 3members] hrs]
 Concepts studied in Wireless and Mobile security should have been used
 Innovative idea should have been attempted
Sample :
1. Design and Implementation of Security algorithm for Wireless networks
2. Implementation of security protocol for mobile network
 Report in Digital format with proposed idea, software package, coding and
results to be submitted.
 Assessment on a continuous basis with a minimum of 3 reviews.
Memos in the Requests for Comments (RFC) document series contain technical
and organizational notes about the wireless and mobile security network.
Text Books
1. Pallapa Venkataram, Satish Babu, “Wireless and Mobile Network Security”, First Edition, Tata
McGraw Hill, 2010.
2. Hakima Chaouchi, Maryline Laurent-Maknavicius, “Wireless and Mobile Network Security
Security Basics, Security in On-the-shelf and Emerging Technologies”, Wiley, 2009

Reference Books
1. Tara M. Swaminathan and Charles R. Eldon, “Wireless Security and Privacy- Best Practices and
Design Techniques”, Addison Wesley, 2002.
2. Makki, S.K., Reiher, P., Makki, K., Pissinou, N., Makki, S, “ Mobile and Wireless Network
Security and Privacy”, Springer, 2007.
3. Xiao, Yang, Shen, Xuemin, Du, Ding-Zhu, “Wireless Network Security”, Springer, 2007.

;
WIRELESS AND MOBILE SECURITY
Knowledge Areas that contain topics and learning outcomes covered in the course

Knowledge Area Total Hours of Coverage

CS: IAS (Information Assurance 30


and Security)

Body of Knowledge coverage

KA Knowledge Unit Topics Covered Hours

CS:IAS IAS/Foundational Security Issues in Mobile Communication:


Concepts in Mobile Communication History, Security – Wired
Security Vs Wireless, Security Issues in Wireless and
Mobile Communications, Security Requirements 3
in Wireless and Mobile Communications, Security
for Mobile Applications, Advantages and
Disadvantages of Application–level Security.

CS:IAS IAS/Network Security of Device, Network, and Server


Security Levels: Mobile Devices Security Requirements,
Mobile Wireless network level Security, Server
Level Security.
Application Level Security in Wireless 6
Networks: Application of WLANs, Wireless
Threats, Vulnerabilities and Attach Methods over
WLANs, Security for 2G Wi-Fi Applications,
Recent Security Schemes for Wi-Fi Applications

CS:IAS IAS/Foundational Application Level Security in Cellular


Concepts in Networks: Generations of Cellular Networks,
Security, Security Issues and attacks in cellular networks, 5
GSM,GPRS and UMTS security for applications,
IAS/Threats and 3G security for applications.
Attacks
CS:IAS IAS/Foundational Application Level Security in MANETs:
Concepts in MANETs, applications of MANETs, MANET
Security, Features, Security Challenges in MANETs, 3
Security Attacks on MANETs.
IAS/Threats and
Attacks
CS:IAS IAS/Foundational Application Level Security in Ubiquitous
Concepts in Networks:
Security, Ubiquitous Computing, Need for Novel Security 3
Schemes for UC, Security Challenges for UC.
IAS/Threats and
Attacks
CS:IAS IAS/Foundational Application Level Security in Heterogeneous
Concepts in Wireless Networks:
Security, Heterogeneous Wireless network architecture, 3
Heterogeneous network application in disaster
IAS/Threats and management, Security problems and attacks in
Attacks heterogeneous wireless networks

CS:IAS IAS/Foundational Wireless Sensor Network Security


Concepts in Attacks on wireless sensor networks and counter
Security, measures – Prevention mechanisms: 5
authentication and traffic protection –
IAS/Threats and centralized and passive intruder detection –
Attacks decentralized intrusion detection

CS:IAS Recent trends 2

Total hours 30

Where does the course fit in the curriculum?

This course is a
 Elective course
 Suitable from Second semester onwards.
 Knowledge of any one programming language is essential.

What is covered in the course?


1. Introduction to Wireless communication
2. Security Issues in Mobile Communication
3. Security of Device, Network, and Server Levels
4. Application Level Security in Wireless Networks, Cellular Networks, MANETs,
Ubiquitous Networks, Heterogeneous Wireless Networks
5. Wireless Sensor Network Security

What is the format of the course?


This Course is designed with 100 minutes of in-classroom sessions per week, 60 minutes of
video/reading instructional material per week, as well as 200 minutes of non-contact time spent
on implementing course related project. Generally this course should have the combination of
lectures, in-class discussion, projects, guest-lectures, mandatory off-class reading material,
quizzes.

How are students assessed?

 Students are assessed on a combination group activities, classroom discussion, projects,


and continuous, final assessment tests.

Additional topics

Other comments
[optional]

Session wise plan


Student Outcomes Covered: 2,9,17

Class Topic Covered levels of Book Remarks


Hour mastery
1 Mobile Communication Familiarity 1
History, Security-Wired
Vs Wireless,
1 Security Issues in Familiarity 1
Wireless and Mobile
Communications,
1 Security Requirements Familiarity 1
in Wireless and Mobile
Communications
1 Mobile Devices Assessment 1
Security Requirements
1 Mobile Wireless Familiarity 1
network level Security,
Server Level Security
1 Application of WLANs, Usage 1
1 Wireless Threats, Usage 1
1 Security for 2G Assessment 1
Wi-Fi Applications,
1 Recent Security Usage 1
Schemes for Wi-Fi
Applications
1 Generations of Cellular Usage 2
Networks,
1 Security Issues and Usage 2
attacks in cellular
networks
1 GSM Security for Usage 2
applications,
1 GPRS Security for Usage 2
applications
1 UMTS security for Familiarity 2
applications, 3G
security for
applications
1 MANETs, applications Assessment 2
of MANETs, MANET
Features
1 Security Challenges in Assessment 1
MANETs
1 Security Attacks on Assessment 1
MANETs
1 Ubiquitous Computing, Usage 1
1 Need for Novel Security Familiarity 1
Schemes for UC,
1 Security Challenges for Assessment 1
UC
1 Heterogeneous Usage 1
Wireless network
architecture,
1 Heterogeneous Assessment 1
network application in
disaster management
1 Security problems and Usage 1
attacks in
heterogeneous wireless
networks
1 Attacks on wireless Usage 2
sensor networks and
counter measures
2 Prevention Familiarity 2
mechanisms:
authentication and
traffic protection
1 centralized and passive Usage 2
intruder detection
1 decentralized intrusion Familiarity 2
detection
30 Hours
(2 Credit
hours
/week 
15 Weeks
schedule)

You might also like