Security of Wireless, Iot, and Mobile Networks
Security of Wireless, Iot, and Mobile Networks
Security of Wireless, Iot, and Mobile Networks
The course exposes the students to the main security challenges of wireless
RATIONALE:
and mobile networks, as well as, the corresponding solutions.
In congruence with the teaching and learning strategy of the college, the
following tools are used:
Classroom lectures, laboratory practical sessions using various
simulations tools and progress meetings.
METHOD OF TEACHING AND
LEARNING: Office hours held by the instructor to provide further assistance to
students.
Use of the Blackboard Learning platform, where instructors post lecture
notes, assignment instructions, timely announcements, as well as
additional resources.
Summative:
1st assessment: Midterm Exam
30%
Short essay questions and case problems.
2nd assessment: Portfolio of student work, including project
ASSESSMENT: 10%
progress and oral assessment (not eligible for 2nd marking)
Final assessment: Individual Project
literature review, design, implementation (code, script or 60%
simulation)
ITC 3632 - 1 of 3
Formative:
Take-home short problems 0%
The formative assessments aim to shape teaching and prepare students for
the summative assessments.
The 1st summative assessment tests the LOs 1 and 2.
The 2nd summative assessment tests the LOs 1-3.
The final summative assessment tests the LOs 1-3.
The final assessment tests all learning outcomes of this module, therefore
students pass the module if the average module grade is 40% or higher.
REQUIRED READING:
W. Osterhage, Wireless Network Security, CRC Press, 2nd edition, 2018,
ISBN-10: 1138093793, ISBN-13: 978-1138093799
RECOMMENDED READING:
1. R. Meyers, Wireless Network Security: Introduction and Explanation of
Cybersecurity and Hacking Technology for Wireless System, Kali Linux
Tools and Other, independently published, 2019.
2. R. Meyers, Linux for Hackers: A Complete Step-by-Step Guide to
Hacking Wireless Network Security and Server Database with
Technology Ecosystem Linux, independently published, 2019.
3. P. Lea, Internet of Things for Architects: Architecting IoT solutions by
INDICATIVE READING: implementing sensors, communication infrastructure, edge computing,
analytics, and security, 1st edition, Packt Publishing, 2018.
4. C. Buchanan & V. Ramachandran, Kali Linux Wireless Penetration
Testing Beginner's Guide - Third Edition: Master wireless testing
techniques to survey and attack wireless networks with Kali Linux,
including the KRACK attack, 3rd Revised edition, Packt Publishing,
2017.
5. J. Wright & J. Cache, Hacking Exposed Wireless, Third Edition: Wireless
Security Secrets & Solutions, McGraw-Hill Education; 3rd edition, 2015.
6. R. K. Nichols, P. C. Lekkas, Wireless Security: Models, Threats, and
Solutions: Models, Threats and Solutions, 1st Edition, 2001, McGraw-
Hill Telecom Professional. ISBN-10: 0071380388, ISBN-13: 978-
0071380386
MS-Office, MS-Visio
Python
SOFTWARE
Kali Linux Virtual Machines, VMWare
REQUIREMENTS:
Aircrack-ng
Wireshark
ITC 3632 - 2 of 3
Isolated WiFi access points.
HARDWARE
Desktops/laptops with sniffing network cards.
REQUIREMENTS:
Small IoT platforms.
http://wireless.csail.mit.edu/
https://lids.mit.edu/labs-and-groups/wireless-information-and-
network-sciences-laboratory-winslab
https://ieeeaccess.ieee.org/
https://people.eecs.berkeley.edu/~daw/research/wireless.html
http://mydecamp.eu/
WWW RESOURCES: https://www.cybrary.it/
https://resources.infosecinstitute.com/category/wireless-
security/#gref
http://icsdweb.aegean.gr/awid/
https://www.nsf.gov/awardsearch/showAward?AWD_ID=1829553
https://www.lifewire.com/
https://www.rfwireless-world.com/
ITC 3632 - 3 of 3