The student is required to have some knowledge of cryptography equivalent to IMT4532 (Cryptology 1)
Expected learning outcomes
The candidate possesses advanced knowledge in the field of wireless communication security, which includes the following topics: security in RFID, wireless LAN, Bluetooth, 2G and 3G mobile telephony.
The candidate possesses thorough knowledge about theory and scientific methods relevant for wireless communication security.
The candidate is capable of applying his/her knowledge in new fields of wireless communication security.
The candidate is capable of analyzing existing theories, methods and interpretations in the field of wireless communication security and working independently on solving theoretical and practical problems.
The candidate can use relevant scientific methods in independent research and development in wireless communication security.
The candidate is capable of performing critical analysis of various literature sources and applying them in structuring and formulating scientific reasoning in the field of wireless communication security.
The candidate is capable of carrying out an independent limited research or development project in wireless communication security under supervision, following the applicable ethical rules.
The candidate is capable of analyzing relevant professional and research ethical problems in the field of wireless communication security.
The candidate is capable of applying his/her knowledge and skills in new fields, in order to accomplish advanced tasks and projects.
The candidate can work independently and is familiar with terminology in the field of wireless communication security.
The candidate is capable of discussing professional problems, analyses and conclusions in the field of wireless communication security, both with specialists and with general audience.
The candidate is capable of contributing to innovation and innovation processes.
1. Basic radio-frequency communications
2. RFID, Wireless LAN, Bluetooth security
3. Security of 2G mobile telephony systems
4. Security of 3G mobile telephony systems
Teaching Methods (additional text)
The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC’s learning management system (ClassFronter).
Form(s) of Assessment
Written exam, 3 hours
Evaluation of Project(s)
Form(s) of Assessment (additional text)
Written exam, 3 hours (counts 70% of the final mark)
Project evaluation (counts 30% of the final mark)
Both parts must be passed.
Alphabetical Scale, A(best) – F (fail)
Evaluated by the lecturer. An external examiner will be used every 4th year. Next time in the school-year 2013/2014.
Ordinary re-sit examination
1. Gunter Schafer, Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications, John Wiley & Son Inc. 2003
2. V. Niemi, K. Nyberg, UMTS Security, John Wiley & Sons, 2005
Replacement course for
IMT5171 - Wireless communication security
In case there will be less than 5 students that will apply for the course, it will be at the discretion of Studieprogramansvarlig whether the course will be offered or not and if yes, in which form.