Wireless Communication Security
2012-2013 - IMT6051 - 5 ECTS

On the basis of

IMT4751 Wireless Communication Security, or equivalent

Expected learning outcomes

Knowledge

The candidate possesses knowledge at the most advanced frontier in the field of wireless communication security. The candidate has mastered academic theory and scientific methods in wireless communication security.

The candidate is capable of considering suitability and use of different methods and processes in research in the field of wireless communication security.

The candidate is capable of contributing to development of new knowledge, theories, methods, interpretations and forms of documentation in the field of wireless communication security.

Skills

The candidate is capable of formulating problems, planning and completing research projects in the field of wireless communication security.

The candidate is capable of doing research and development at a high international level.

The candidate is capable of handling complex academic tasks. The candidate can challenge established knowledge and practice in the field of wireless communication security.

General competence

The candidate is capable of identifying relevant – and possibly new - ethical problems and exercising research in the field of wireless communication security with academic integrity.

The candidate is capable of managing complex interdisciplinary tasks and projects.

The candidate is capable of disseminating the results of research and development in the field of wireless communication security through approved national and international publication channels.

The candidate is capable of taking part in debates in international forums within the field of wireless communication security.

The candidate is capable of considering the need for, taking initiative to and engaging in innovation in the field of wireless communication security.

Topic(s)

  1.  Introduction – elements of radio frequency theory, elements of information security with applications in the wireless environment
  2.  Elements of RFID systems security analysis with case studies: the electronic passport
  3.  Elements of WLAN security analysis
  4.  Bluetooth system security
  5.  Security in mobile telephony systems with case studies: the 2G, the 3G and beyond.

Teaching Methods

Lectures
Project work

Teaching Methods (additional text)

Lectures

Project work

Form(s) of Assessment

Written exam, 3 hours
Evaluation of Project(s)

Form(s) of Assessment (additional text)

Written exam, 3 hours (alternatively oral exam)

Project evaluation

Both parts must be passed.

Grading Scale

Pass/Failure

External/internal examiner

Evaluated by the lecturer. Every 4th year, an external examiner is used, next time in 2015.

Re-sit examination

The whole subject must be repeated

Examination support

Calculator, dictionary

Coursework Requirements

None

Teaching Materials

Books:

1. Gunter Schafer, Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications, John Wiley & Son Inc. 2003

2. V. Niemi, K. Nyberg, UMTS Security, John Wiley & Sons, 2005

Various papers (available on-line)

Additional information

There is room for 50 students for the course