• Post category:StudyBullet-8
  • Reading time:7 mins read


Learn the security requirements, threats, attacks, and possible defenses/protections in wireless 4G/5G cellular networks

What you will learn

Be aware of the different types of wireless networks and their security requirements.

Know the benefits, advantages and pitfalls of wireless networks.

Determine if wireless security is truly secure.

Know the different ways to secure wireless technology.

Becoming familiar with the security requirements of wireless networks.

Becoming familiar with the security vulnerabilities and attacks in wireless.

Learning the security defense protocols and paradigms for wireless networks.

Learning wireless physical-layer security techniques against eavesdropping, and wireless jamming attacks and their countermeasures.

Ability to provide recommendations and suggestions to improve the security level of wireless networks

Know the future of both wireless technology and its security.

Description

Wireless Security in Mobile Communication Networks: From encryption to physical layer security.

This wireless security course is designed to make students familiar with the main security requirements, security vulnerabilities, threats, and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security (PLS) against eavesdropping, and wireless jamming attacks and their countermeasures, know the main methods of physical-layer authentication, and be aware of some of the open challenges and recommendations in the wireless security domain.

The main objective of this wireless security course is to introduce the students to the field of wireless security and its importance, compare wired and wireless security, review OSI layers and state their security mechanisms, and discuss the security requirements, security vulnerabilities, and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security against eavesdropping, and learn wireless jamming attacks and their countermeasures, and state some open challenges and recommendations.

This course will discuss a variety of topics including the differences between the wireless network and wired network, wireless technical standards, and current and future applications of wireless technology. The course will also examine the challenges and types of (WS), its vulnerabilities, and security issues. Lastly, the course will discuss securing wireless technology and its future.


Get Instant Notification of New Courses on our Telegram channel.


======== About the Insturctor ===========

Jehad M. HAMAMREH is the Founder and Director of WISLABi, Editor at Researcherstore & RS-OJICT journal, as well as A. Professor with the Electrical and Computer Engineering Department, Antalya International (Bilim) University. He earned his Ph.D. degree in Telecommunication Engineering and Cyber-Systems from Medipol University. Previously, he worked as a Researcher at the Department of Electrical and Computer Engineering at Texas A&M University. He is the inventor of more than 20 Patents and has authored more than 90 peer-reviewed scientific papers along with several book chapters. His innovative patented works won the gold, silver, and bronze medals in numerous international invention contests and fairs.

His current research interests include Wireless Communication, Wireless Security, Wireless Sensing, O-RAN, 5G/6G, IoT, AI/ML, wireless physical and MAC layers security, orthogonal frequency-division multiplexing (OFDM), multiple-input multiple-output systems (MIMO), advanced waveforms design, multidimensional modulation techniques, and orthogonal/non-orthogonal multiple access schemes for future wireless systems. He is a regular investigator and a referee for various scientific journals as well as a TPC member for several international conferences. He is an Editor at RS-OJICT and Frontiers in Communications and Networks.

Key Research Topics: Wireless Communication, Wireless Security, Wireless Sensing, Open RAN, 5G/6G, IoT-AI

English
language

Content

Wireless Security

Course Content Intro – Trailer
Introduction, motivation & main content (syllabus) of the Wireless Security Cour
Comparing wired to wireless to understand their security
The OSI layers functionalities and protocols in wireless communication networks
Security Requirements in Wireless Networks
Security attacks at the Physical, MAC, Network, Transport, & Application Layers
How to prevent security attacks at different OSI layers
Overview of main encryption methods used for data protection & confidentiality
Wireless Security Course Lecture 3 Part 3
A summary overview of the WS topics discussed in the first 3 lectures
The security methods that exist in current wireless networks
Multi-factor authentication in wireless communication networks
5G Security, Applications, Services, and Main Technologies
5G Security landscape
Security issues related to virtualization in 5G Networks
Security and Privacy in 5G Systems and Networks
Wireless physical layer security concept and its main methods
How cryptography is going against the requirements of future IoT?
Jamming Types and DoS Attacks
The Physical layer security (PLS) concept
The Physical layer security (PLS) model and examples
Summary of the main physical layer security techniques in the literature
Physical Layer Authentication (PLA) – Part 1
Physical Layer Authentication (PLA) – Part 2
Physical Layer Authentication (PLA) – Part 3
Physical Layer Authentication (PLA) – Part 4
Discussion with students on TOR