Handheld Devices”, National Institute of Standards and Technology, US Dept. of
.... Self test questions. 40. 4G Wireless Communications. Systems. 2,3. PPT / BB.
SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF Telecommunication Engineering COURSE PLAN Course Code Course Title Semester Location
: TN0504 : Wireless Network Security : I - M. Tech. (TCN) : SRM University – Tech Park 13th floor
Faculty Details SL. NO 1
NAME
OFFICE
Mrs. Kavitha Narayanan
E-MAIL ID
th
Tech Park 13 Floor
[email protected]
1. Hideki Imai, Mohammad Ghulam Rahman & Kazukuni Kobara, “Wireless Communications Security”, Artech House, 2006. 2. Tom Karygiannis, Les Owens,“Wireless Network Security 802.11, Bluetooth and Handheld Devices”, National Institute of Standards and Technology, US Dept. of Commerce Special Publication 800-48, 2002. 3. “Wireless Network Security”, Edited by Yang Xiao, Xuemin Shen and Ding-Zhu Du, Springer, 2007. 4. William Stallings, “Cryptography and Network Security”, Pearson Education, 2003.
Prerequisite NIL
Objectives The main purpose of this course is to introduce to students to the emerging areas of Wireless Network security. This will enable the students to acquire a solid understanding of different components involved in the Wireless Network security techniques and different ways of distributing the multimedia data.
Assessment details Cycle Test – I Cycle Test- II Term Paper
: 25 Marks : 25 Marks : 10Marks
Surprise Quiz : 5 Marks Attendance : 5 Marks
Test Schedule SL.NO 1 2 3
DATE
TEST Cycle test- I Cycle test- II Term Paper
TOPICS Entire Portion
Outcomes To learn about 1. Different elements of Wireless Networks 2. Various techniques of Wireless Network security
DURATION 2 periods 3 Hrs 3 Hrs
DETAILED SESSION PLAN Cryptography - Basic Concepts - Types of Cryptosystems - Goals of a Cryptosystem; Security - Symmetric Encryption Schemes - Asymmetric Cryptosystems and Digital Signatures - Public- Key Encryption - Public Key Infrastructure (PKI) and Certificate Authorities – RSA Cryptosystem - Digital Signature – DSA Session No
Topics to be covered
Ref ere nce
Teaching Method
Testing Method
1.Group discussion 2.Self-test questions 1..Quiz 2. Self- Test Questions 1.Self-test questions 2.Group discussion
1
Cryptography
4
PPT / BB
2
Basic Concepts
4
PPT / BB
3
Types of Cryptosystems
4
PPT / BB
4
Goals of a Cryptosystem
4
PPT / BB
Group discussion
5
Security
4
PPT / BB
1.Self test questions
6
Symmetric Encryption Schemes
4
PPT / BB
1.Self test questions
7
S-DES
4
PPT / BB
1.Self test questions
8
DES
4
PPT / BB
1.Self test questions
9
IDEA
4
PPT / BB
1.Self test questions
10
Public Key Encryption
4
PPT / BB
1.Self test questions
11
RSA Cryptosystem
4
PPT / BB
1.Self test questions
12
RSA Cryptosystem Public Key Infrastructure (PKI) and Certificate authorities Public Key Infrastructure (PKI) and Certificate authorities Digital Signature
4
PPT / BB
1.Self test questions
4
PPT / BB
1.Self test questions
4
PPT / BB
1.Self test questions
4
PPT / BB
1.Self test questions
13 14 15
4 PPT / BB 1.Self test questions DSA Security Features in Wireless Environment - Mobile Network Environment - General Security Threats of a Network - Limitations of Mobile Environment - Mobility and Security - Attacks in Mobile Environment - Security Issues in Mobile Environment Security Features in Wireless 1.Quiz 17 1 PPT / BB 2.Self test questions Environment 16
18 19 20
Mobile Network Environment General Security Threats of a Network Limitations of Mobile Environment
1
PPT / BB
1.Quiz 2.Self test questions
1
PPT / BB
Self test questions
1
PPT / BB
Review
21
Mobility and Security
1
PPT / BB
22
Attacks in Mobile Environment
1
PPT / BB
1
PPT / BB
1
PPT / BB
23 24
Security Issues in Mobile Environment Security Issues in Mobile Environment
1.Quiz 2.Self test questions 1.Quiz 2.Self test questions 1.Group discussion 2.Self test questions 1.Group discussion 2.Self test questions
Overview of IEEE 802.11, Brief History, Architecture & layers - Security of IEEE 802.11; 4.2.1 Bluetooth Overview - Architecture and Components - Security of Bluetooth; Over view of GSM - Architecture of the GSM Network - GSM Security Features - Attacks on GSM Security – Imode Introduction. 3G Wireless Communications Systems -3GPP - 3GPP Security Objectives; 3G Security Architecture. Data Integrity - 4G Wireless Communications Systems 25
Overview of IEEE 802.11
2,3
PPT / BB
26
Brief History
2,3
PPT / BB
27
Architecture & layers
2,3
PPT / BB
1.Quiz 2.Self test questions 1.Quiz 2.Self test questions 1.Quiz 2.Self test questions
2,3
PPT / BB
Group discussion
29
Security of IEEE 802.11; 4.2.1 Bluetooth Overview Architecture and Components
2,3
PPT / BB
Group discussion
30
Security of Bluetooth
2,3
PPT / BB
31
Over view of GSM
2,3
PPT / BB
2,3
PPT / BB
Self test questions
PPT / BB
Self test questions
PPT / BB
Self test questions
28
32 33 34
Architecture of the GSM Network Architecture of the GSM Network GSM Security Features
2,3
1.Quiz 2.Self test questions 1.Quiz 2.Self test questions
2,3 PPT / BB Self test questions Attacks on GSM Security Introduction. 3G Wireless 36 2,3 PPT / BB Self test questions Communications Systems 3GPP 37 2,3 PPT / BB Self test questions 3GPP Security Objectives 3G Security Architecture. Data 38 2,3 PPT / BB Self test questions Integrity 3G Security Architecture. Data 39 2,3 PPT / BB Self test questions Integrity 4G Wireless Communications 40 2,3 PPT / BB Self test questions Systems Wireless Handheld Devices Overview, Benefits, Security Requirements and Threats & other issues; Overview of Wireless Application Protocol (WAP) - Protocol Stack and security related issues. Wireless Handheld Devices 1.Quiz 41 2,3 PPT / BB 2.Self test questions Overview Security Requirements and 1.Quiz 42 2,3 PPT / BB 2.Self test questions Threats & other issues Overview of Wireless 1.Quiz 43 2,3 PPT / BB 2.Self test questions Application Protocol (WAP) Wireless Application Protocol 1.Quiz 44 2,3 PPT / BB 2.Self test questions (WAP) Protocol Stack and security 45 2,3 PPT / BB Group discussion related issues 35