Wireless Communication Security
2015-2016 - IMT6051 - 5 ECTS

Expected learning outcomes

Knowledge

  • The candidate possesses knowledge at the most advanced frontier in the field of wireless communication security. The candidate has mastered academic theory and scientific methods in wireless communication security.
  • The candidate is capable of considering suitability and use of different methods and processes in research in the field of wireless communication security.
  • The candidate is capable of contributing to development of new knowledge, theories, methods, interpretations and forms of documentation in the field of wireless communication security.

Skills

  • The candidate is capable of formulating problems, planning and completing research projects in the field of wireless communication security.
  • The candidate is capable of doing research and development at a high international level.
  • The candidate is capable of handling complex academic tasks. The candidate can challenge established knowledge and practice in the field of wireless communication security.

General competence

  • The candidate is capable of identifying relevant – and possibly new - ethical problems and exercising research in the field of wireless communication security with academic integrity.
  • The candidate is capable of managing complex interdisciplinary tasks and projects.
  • The candidate is capable of disseminating the results of research and development in the field of wireless communication security through approved national and international publication channels.
  • The candidate is capable of taking part in debates in international forums within the field of wireless communication security.
  • The candidate is capable of considering the need for, taking initiative to and engaging in innovation in the field of wireless communication security.

Topic(s)

  1.  Introduction – elements of radio frequency theory, elements of information security with applications in the wireless environment
  2.  Elements of RFID systems security analysis with case studies: the electronic passport
  3.  Elements of WLAN security analysis
  4.  Bluetooth system security
  5.  Security in mobile telephony systems with case studies: the 2G, the 3G and the 4G.

Teaching Methods

Lectures
Project work

Form(s) of Assessment

Oral exam, individually
Evaluation of Project(s)

Form(s) of Assessment (additional text)

  • Oral exam
  • Project evaluation
  • Both parts must be passed.

Grading Scale

Pass/Failure

External/internal examiner

Project: one internal examiner. Every 4th year, an external examiner is used, next time in 2015.

Oral exam: two internal examiners. Every 4th year, an external examiner is used, next time in 2017.

Re-sit examination

The whole course must be repeated

Examination support

Calculator, dictionary

Coursework Requirements

None

Teaching Materials

Books:

1. D. Forsberg, G. Horn, W. Moeller, V. Niemi, LTE Security, 2nd. edition, Wiley, 2013.

Various papers (available on-line)

Additional information

There is room for 50 students for the course