CS4538 Mobile Device and Wireless Security
|Instructor: ||Dr. Thomas Krenc
|Office: ||Glasgow East 124
|Office Phone: ||831-656-2902
|E-mail: ||email@example.com (preferred)
|Office Hours: ||By Appointment
|Lecture (virtual):|| MTW 09:00-10:00
|Lab (virtual):||Th 09:00-10:00
The application of mobile and wireless devices has grown rapidly in military
and commercial environments. The functionality and reliability of these devices
has grown tremendously. The mobile and wireless nature of these devices raise
new and important security challenges not usually present in static
environments. This course will address these challenges including the security
functionality, protocol, and assurance issues associated with this emerging
technology. Prerequisites: CS3600 and CS3690 and CS4537.
Wireless devices and networks have fundamental differences from their wired
counterparts, e.g. broadcast communications, mobility, etc. As a result,
wireless networks face unique attack vectors and thus must implement
wireless-specific security strategies. Students will gain an understanding
the security implications of wireless technologies, learn specific attacks,
and develop techniques to secure wireless devices and networks.
- Understand the security implications inherent in wireless
devices, as compared to their wired counterparts,
e.g. broadcast communications, mobility, etc.
- Understand the unique attack vectors faced by wireless
networks and required wireless-specific security strategies
to mitigate attacks.
- Learn fundamentals of wireless exploitation techniques,
and gain hands-on experience attacking wireless networks
and devices via laboratory experiments.
- Understand the use of cryptographic primitives in specific
wireless applications, including: 802.11, GSM, RFID, and
- Understand techniques to secure wireless devices and networks.
A mix of interactive lectures and problem solving exercises will
be used to investigate the topic material in class.
Students are responsible for reading the material in
the text that supports each topic of discussion prior to its
Supplemental material may be provided as necessary to augment
material in the text.
will evolve over the duration of the quarter; check back frequently as
this is the primary mode of coordination.
No required textbook.
- Real 802.11 Security, by Jon Edney and William A. Arbaugh
- Wi-Foo: The Secrets of Wireless Hacking, by Andrew
Vladimirov and Konstantin V. G
- Applied Cryptography, by Bruce Schneier
Late work accrues a penalty of 10% off per business day.
Academic honesty: abide by the NPS Honor
Code, no exceptions.
As this is an applied course on wireless security,
there is a strong emphasis on the labs which account for
50% of your grade. Labs will be assigned on the web site
and will be worked on both in and out of lab time. During
lab time, the professor will be available to assist. Some
labs will span multiple weeks: due dates will be posted
on the class schedule. You may discuss your lab with
others in the class, but your solutions and writeup must
be your own. You must list all collaborators.
Labs should be turned in via NPS CLE Sakai course web site.
The writeup must be in PDF --
no other formats accepted.