CSCI-B 470 Wireless and Mobile Security
3 credits
- Prerequisite(s): CSCI-C 335 or CSCI-B 443 OR CSCI 40200
- Delivery: On-Campus
- Semesters offered: Spring (Check the schedule to confirm.)
- Equivalent(s): CSCI 49000 Wireless and Mobile Computing
Description
This course covers challenges and strategies for safeguarding wireless and mobile systems. Students learn to identify, assess, and mitigate security risks, including authentication and authorization, distributed denial of service, jamming, malware injection, and side-channel attacks. Topics include security for blockchain, machine learning, mobile crowdsourcing, Internet of Things, and voice-controlled systems.
Topics
Introduction to wireless and mobile security
- Overview of technologies
- Security challenges
- Importance of security
Cryptographic techniques
- Cryptographic primitives and algorithms
- Public key infrastructure and digital signatures
- Secure key exchange and management
- Protocols for wireless and mobile communication
Wireless jamming attacks
- Techniques and impact
- Detection and mitigation
- Cooperative and friendly jamming approaches
IoT Security
- Security challenges
- Device authentication and access control
- Data transmission and storage
Blockchain security
- Fundamentals
- Applications in wireless and mobile systems
- Considerations and protection methods
Authentication and Authorization
- Types of attacks
- Multi-factor and biometric methods
- Access control models and mechanisms
- Defense strategies
Distributed denial of service attacks and defenses
- Types targeting wireless and mobile networks
- Detection and mitigation techniques
Malware and mobile devices
- Injection techniques
- Prevention and detection
- Mobile application security and code analysis
Side channel attacks and defenses
- Exploiting unintended information leaks
- Detection and prevention techniques
- Secure coding practices
Voice-control systems security
- Authentication and authorization mechanisms
- Vulnerabilities and attacks
- Security enhancements
Machine learning security
- Applications in wireless and mobile security
- Adversarial attacks
- Algorithm and data security
Mobile information privacy
- Privacy concerns
- Location-based privacy and tracking
- Privacy-enhancing technologies
Mobile crowdsourcing security
- Overview and participatory sensing
- Security and privacy challenges
- Data aggregation and authentication
Learning Outcomes
- Analyze wireless and mobile systems' vulnerabilities, threats, and security implications. CS 5
- Evaluate authentication and authorization mechanisms, comparing their strengths and weaknesses. CS 5
- Assess strategies for mitigating distributed denial of service (DDoS) attacks and weaknesses in countermeasures. CS 5
- Analyze and respond to wireless and mobile security threats, including jamming, malware injection, side-channel attacks, and their impacts, while formulating advanced strategies for mitigation. CS 5
- Formulate innovative solutions to address blockchain, machine learning, mobile crowdsourcing, IoT, and voice-controlled systems security challenges. CS 5
- Create and implement methodologies to detect and respond to jamming, malware injection, and side-channel attacks. CS 5
- Design a well-structured project proposal outlining methodologies and technologies to address specific wireless and mobile security challenges, carry out the project, and present it. CS 7
Policies and Procedures
Please be aware of the following linked policies and procedures. Note that in individual courses instructors will have stipulations specific to their course.