Wireless Systems Security

Course Description

explain foundations of operation of modern wireless communications systems, explain security challenges of wireless communications systems, explain operation of physical and access layer of wireless communications networks, explain challenges for security and danger in the operation, give overview of current standards in the field in the world, European Union and Republic of Croatia, explain different security concepts of wireless networks in different applications areas, explain vulnerability and countermeasures of solving security issues of various wireless networks, interactive work with students in the case analysis of various networks types.

Learning Outcomes

  1. explain operation of modern wireless communications systems
  2. explain security challenges of wireless communications systems
  3. explain operation of physical and access layer of modern wireless networks
  4. explain requirements for security and danger in the operation
  5. give overview of current standards in the field in the world, European Union and Republic of Croatia
  6. explain vulnerability and counter-measures of solving problems of wireless networks with various applications
  7. perform case analysis of wireless networks security

Forms of Teaching

Lectures

Lectures

Grading Method

Continuous Assessment Exam
Type Threshold Percent of Grade Threshold Percent of Grade
Attendance 0 % 10 % 0 % 0 %
Mid Term Exam: Written 0 % 45 % 0 %
Final Exam: Written 0 % 45 %
Exam: Written 0 % 100 %

Week by Week Schedule

  1. End-to-end security
  2. End-to-end security
  3. Security threats; Security requirements for networks and services; Security analysis; Protection measures; Security standards, organizations, and bodies; Relevant laws and recommendations
  4. Security threats; Security requirements for networks and services; Security analysis; Protection measures; Security standards, organizations, and bodies; Relevant laws and recommendations
  5. Security threats; Security requirements for networks and services; Security analysis; Protection measures; Security standards, organizations, and bodies; Relevant laws and recommendations
  6. Security threats; Security requirements for networks and services; Security analysis; Protection measures; Security standards, organizations, and bodies; Relevant laws and recommendations
  7. Mobile networks security
  8. Midterm exam
  9. Security in mobile networks
  10. Mobile networks security
  11. Authentication and authorization, access control (mandatory vs; discretionary)
  12. Internet of Things protocols
  13. Security in M2M communication
  14. Security in M2M communication
  15. Final exam

Study Programmes

University graduate
[FER3-HR] Audio Technologies and Electroacoustics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Communication and Space Technologies - profile
Elective Courses (1. semester) (3. semester)
Elective Courses of the Profile (1. semester) (3. semester)
[FER3-HR] Computational Modelling in Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computer Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Computer Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Control Systems and Robotics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Data Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electrical Power Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electric Machines, Drives and Automation - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electronic and Computer Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Electronics - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Information and Communication Engineering - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Network Science - profile
Elective Courses (1. semester) (3. semester)
[FER3-HR] Software Engineering and Information Systems - profile
Elective Courses (1. semester) (3. semester)

Literature

(.), Jim Doherty, Wireless and Mobile Devices Security, Jones Bartlett Learning, 2016,
(.), Yang Xiao, Security in Distributed, Grid, Mobile, and Pervasive Computing, CRC Press, 2007,
(.), Yang Xiao, Security in Sensor Networks, CRC Press, 2016,
(.), Wolfgang Osterhage, Wireless Network Security, CRC Press; 2 edition, 2018,
(.), Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang, Security and Privacy for Next-Generation Wireless Networks, Springer; 1st ed., 2018,
(.), Krishna Sankar and Sri Sundaralingam, Cisco Wireless LAN Security, 2004,

Laboratory exercises

For students

General

ID 222653
  Winter semester
5 ECTS
L1 English Level
L1 e-Learning
45 Lectures
0 Seminar
0 Exercises
6 Laboratory exercises
0 Project laboratory

Grading System

85 Excellent
70 Very Good
60 Good
50 Acceptable