Learn the security requirements, threats, attacks, and possible defenses/protections in wireless 4G/5G cellular networks
What you will learn
Be aware of the different types of wireless networks and their security requirements.
Know the benefits, advantages and pitfalls of wireless networks.
Determine if wireless security is truly secure.
Know the different ways to secure wireless technology.
Becoming familiar with the security requirements of wireless networks.
Becoming familiar with the security vulnerabilities and attacks in wireless.
Learning the security defense protocols and paradigms for wireless networks.
Learning wireless physical-layer security techniques against eavesdropping, and wireless jamming attacks and their countermeasures.
Ability to provide recommendations and suggestions to improve the security level of wireless networks
Know the future of both wireless technology and its security.
Description
Wireless Security in Mobile Communication Networks: From encryption to physical layer security.
This wireless security course is designed to make students familiar with the main security requirements, security vulnerabilities, threats, and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security (PLS) against eavesdropping, and wireless jamming attacks and their countermeasures, know the main methods of physical-layer authentication, and be aware of some of the open challenges and recommendations in the wireless security domain.
The main objective of this wireless security course is to introduce the students to the field of wireless security and its importance, compare wired and wireless security, review OSI layers and state their security mechanisms, and discuss the security requirements, security vulnerabilities, and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security against eavesdropping, and learn wireless jamming attacks and their countermeasures, and state some open challenges and recommendations.
This course will discuss a variety of topics including the differences between the wireless network and wired network, wireless technical standards, and current and future applications of wireless technology. The course will also examine the challenges and types of (WS), its vulnerabilities, and security issues. Lastly, the course will discuss securing wireless technology and its future.
======== About the Insturctor ===========
Jehad M. HAMAMREH is the Founder and Director of WISLABi, Editor at Researcherstore & RS-OJICT journal, as well as A. Professor with the Electrical and Computer Engineering Department, Antalya International (Bilim) University. He earned his Ph.D. degree in Telecommunication Engineering and Cyber-Systems from Medipol University. Previously, he worked as a Researcher at the Department of Electrical and Computer Engineering at Texas A&M University. He is the inventor of more than 20 Patents and has authored more than 90 peer-reviewed scientific papers along with several book chapters. His innovative patented works won the gold, silver, and bronze medals in numerous international invention contests and fairs.
His current research interests include Wireless Communication, Wireless Security, Wireless Sensing, O-RAN, 5G/6G, IoT, AI/ML, wireless physical and MAC layers security, orthogonal frequency-division multiplexing (OFDM), multiple-input multiple-output systems (MIMO), advanced waveforms design, multidimensional modulation techniques, and orthogonal/non-orthogonal multiple access schemes for future wireless systems. He is a regular investigator and a referee for various scientific journals as well as a TPC member for several international conferences. He is an Editor at RS-OJICT and Frontiers in Communications and Networks.
Key Research Topics: Wireless Communication, Wireless Security, Wireless Sensing, Open RAN, 5G/6G, IoT-AI
Content