Winter
2006

Security in Wireless Networks
(half-course, 4VL + 2 PR)


Computer Science Department
Systems Architecture Group

IMPORTANT: This is a draft. The final document may differ significantly from the current version.

 
Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]
 

Synopsis:

  • Half-Course, Praktische Informatik, Hauptstudium.
  • Offered regularly, at least once every two years, usually in spring.
  • 2 lectures per week, 2h each, over one semester (4SWS VL).
  • 1 lab (Praktikum) per week, 2h each, over one semester (2SWS PR).

Prerequisites:

  • Successful completion of lecture "Security Engineering" or an adequate knowledge.
  • Medium | high security engineering knowledge.
  • At least one semester attendance of  'Development Tools and System Administration in Unix'.

Slides: (pdf)

Demonstrations: (please use with care and conform to CBO)

Syllabus:

  • Introduction
  • Existing Wireless Networks
  • New Wireless Networks and New Challenges
  • Trust
  • Thwarting Malicious Behavior
  • Naming and Addressing
  • Establishment of Security Associations
  • Thwarting the Wormhole Attack
  • Secure Routing in Multi-Hop Wireless Networks
  • Privacy Protection
  • Thwarting Selfish Behavior
  • Selfish Behavior at the MAC layer of CSMA/CA
  • Selfishness in Packet Forwarding
  • Cooperation among Operators
  • Secure Protocols for Behavior Enforcement
  • Appendices
  • Introduction to Security and Cryptographic Functions
  • Introduction to Game Theory

Syllabus - Lab (Practicum, 70% = 38.5 points required): (Draft)

  • Lab 1:
  • Lab 2:
  • Lab 3:
1.

Suggested Readings (Books):

 Links
Cambridge
Ross Anderson's home page
Bruce Schneier
home page
Safe Personal Computing (DE)
NIH
Computer Security Information
NIST
Computer Security Resource Center
NIST
Federal Information Processing Standards Publications (FIPS)
CERT
 
cert.org
BSI
Bundesamt für Sicherheit in der Informationstechnik
Biometrics
The Biometric Consortium
Overview (german)
OS specific
Windows-Security
Linux-Security
e-Learning
CrypTool (de)


 


Legal disclaimer. .  © 2024 Humboldt-Universität zu Berlin, Computer Science Department, Systems Architecture Group.Contact: sar@informatik.hu-berlin.de .