Course SummaryPrerequisites: Minimum Knowledge!
Course Level: Master Learning effort: min. of 150 hours of study (30 hrs. e-learning directed study, 15 hrs. collaborative online lab, 15 hrs. collaborative project, 60 hrs. preparation/follow up of labs/project, 30 hrs. follow up independent study and individual preparation for exam). Credits: 6 ECTS |
Teaching method: Blended Learning
The instructor answers students’ questions (Q&A), presents problems and case studies, moderates discussions using interactive systems e.g. webinar or video conference. These weekly supportive sessions are announced a priori to the participants.
Learning objectives:
Upon completion of the course students will be able to:
- Understand the threats and the security requirements in operating a wireless, ad hoc or mobile network.
- Understand the threats for mobile users and their security needs.
- Determine what security services are needed in some wireless scenarios and what mechanisms can best provide these services at the different layers of the protocol stack.
- Analyze wireless security protocols in terms of the level of security they provide, their effectiveness and complexity.
General description:
The course aims at introducing the fundamental notions and tools in wireless communication and network security, with a focus on the solutions, attacks and countermeasures that can be deployed at the different layers in wireless and mobile networks. In the fundamental framework, threats that are typical in wireless and mobile networks will be presented, together with the security services and mechanisms that can prevent them. In this context, computational vs unconditional security notions will be explored, cryptographic and non-cryptographic security mechanisms will be introduced, and their usage for wireless network security will be presented. In the more specific part of the course, several security protocols that are currently used or have been proposed in the literature will be discussed, simulated and implemented in the virtual lab.
Course content:
Application Layer Security
- Secure localization
- Location privacy
- Vehicular networks security
- SSL/TLS implementation in mobile systems
- Network Layer Security
- Secure routing for ad hoc networks
- Secure neighbour discovery
- Wormhole attacks
- Secure network coding
- Secure handover in cellular networks
- Secure data aggregation in Wireless Sensor Networks
- Integrity protection of satellite navigation messages
- Securing Medium Access Control policies
- Physical layer secrecy; achievable secrecy rates
- Secrecy capacity for Gaussian, fading and MIMO channels
- Unconditionally secure secret key agreement
- Secret key capacity for Gaussian, fading and MIMO channels
- Jamming and its rejection; mutual information jamming games
- Channel-based authentication
- Wireless fingerprinting
- Security in UMTS/LTE/LTE-A
- IEEE 802.11 (Wi-Fi) and WiMax security
- Security for mobile IP
Lab assignments:
Application and Transport Layer (with Android devices and/or virtual machines)
- Android security auditing with Genymotion virtual machine and Burp Suite proxy
- Capturing and monitoring android network traffic
- Sniffing insecure connections
- SSL man-in-the-middle attack: stealing credentials
- Getting remote shell command
- Penetration testing framework for Android applications
- SSL man-in-the-middle attack using SSL Strip & mobile network exploit
- Secure data aggregation
- Wormhole attacks
- Secure routing
- GNSS data spoofing, navigation message authentication
- Physical layer secrecy, wiretap coding and decoding, strong secrecy assessment
- Information theoretic key agreement, information reconciliation and privacy amplification
- Jamming rejection, time-frequency hopping, wideband modulation
- GNSS spoofing and detection, delay attacks, meaconing, position spoofing
Collaborative and cumulative project:
A project will be assigned to the students. The project will be carried out in a collaborative manner by international teams of 2-3 students. It will be presented in a form of a wiki. The project will be cumulative, i.e. each project step is based on the framework provided by the prior steps. The project is mandatory for being admitted to the exam.
Discussions:
Throughout the course, students will be involved in e-discussions related to the course content, through means specific to e-learning, such as forums, wikis, e-portfolios, etc. As part of the virtual community, each student will give feedback to at least two colleagues in the forums.
Performance:
- Lab performance = 30% of the final grade.
- Project performance = 20% of the final grade.
- Discussions performance = 10% of the final grade.
- Written presence exam (60 min.) = 40% of the final grade. (conducted at the home university with a help of a trusted teacher)
Reading List:
- L. Buttyan and J.-P. Hubaux, Security and cooperation in wireless networks. Thwarting malicious and selfish behavior in the age of ubiquitous computing. Cambridge University Press, 2007.
- Y. Xiao, X. Shen, D. Du (eds.), Wireless network security. Springer International Publishing, 2007.
- M. R. Bloch and J. Barros, Physical-Layer Security. From Information Theory to Security Engineering. Cambridge University Press, 2011.
Nicola Laurenti Assistant Professor, University of Padua, Department of Information Engineering, School of Engineering, Padua, Italy Research interests: Wireless & Unconditional Security, Quantum Cryptography As engineers, we often face the problem of ensuring system reliability by protecting against impairments that are random but regular and statistically predictable, or providing safety against virtually unpredictable, possibly catastrophic, yet rare events. Security is the only field where we have to confront a cunning adversary who makes every effort to be unpredictable and will consistently exploit any vulnerability in our design. Benvenuto al nostro corso!”