440-4123/01 – Selected Issues of Communications Security (VPBK)

Gurantor departmentDepartment of TelecommunicationsCredits4
Subject guarantorprof. Ing. Miroslav Vozňák, Ph.D.Subject version guarantorprof. Ing. Miroslav Vozňák, Ph.D.
Study levelundergraduate or graduateRequirementCompulsory
Study languageCzech
Year of introduction2019/2020Year of cancellation
Intended for the facultiesFEIIntended for study typesFollow-up Master
Instruction secured by
LoginNameTuitorTeacher giving lectures
BEH032 Ing. Ladislav Beháň
PAR0038 Ing. Pavol Partila, Ph.D.
REZ106 Ing. Filip Řezáč, Ph.D.
ROZ132 Ing. Jan Rozhon, Ph.D.
SAF077 Ing. Jakub Šafařík, Ph.D.
SEV0097 Ing. Lukáš Ševčík
TOM551 Ing. Martin Tomis, Ph.D.
VOZ29 prof. Ing. Miroslav Vozňák, Ph.D.
Extent of instruction for forms of study
Form of studyWay of compl.Extent
Full-time Credit and Examination 2+2
Part-time Credit and Examination 4+10

Subject aims expressed by acquired skills and competences

The aim of the subject is to familiarize the students with theoretical and especially practical aspects of communications security. After the subject completion students will be able to orient especially in the security of wireless networks and other domains such as the quantum cryptography, Netflow analysis or honeypots/honeynets.

Teaching methods



The subject focuses on the selected hot issues of communications security. First half of the course is dedicated to the security of wireless and mobile networks. In the second part, students familiarize themselves with optical fiber sensors for security purposes, the quantum cryptography, NetFlow analysis and honeypots/honeynets. Selectes issues come more or less from outcomes of research projects solved by VŠB-TUO.

Compulsory literature:

[1] CHAOUCHI, H., LAURENT-MACKANIVICIUS, M. Wireless and Mobile Network Security, Wiley; 1 edition, 744 pages, 2009.

Recommended literature:

[1] SPITZNER, L. Honeypots: tracking hackers. Addison-Wesley, 2003.

Way of continuous check of knowledge in the course of semester

4 evaluated tasks from the presented topics(40 points overall) 1/ Abuse of weakness in wireless or mobile networks and breaking, practical task, W5 (10 points) 2 / In-door or out-door localization monitoring, practical task, W8 (10 points) 3 / Design of quantum networks, QKD simulator or QN, W10 (10 points) 4 / Analysis of data from Netflow of network elements or data captured on hoenypots, W12 (10 points)


Other requirements

No additional requirements are placed on the student.


Subject has no prerequisities.


Subject has no co-requisities.

Subject syllabus:

1. The introduction to communications security concerns, technology overview, the relation to other subjects and topics. 2. Wireless networks vulnerabilities, CUDA-base WiFi network penetration tests. 3. Security concerns of wireless sensor networks, message delivery blocking, message faking and eavesdropping, sensor manipulation. 4. Mobile networks vulnerabilities, active GSM network jamming, UMTS and LTE jamming resilience, base station faking and scanning, IMSI and content sniffing. 5. Eavesdropping in the mobile networks and its detection, encryption profiles in various technologies, known security weaknesses of GSM (A5 cipher), location and traffic data mining. 6. Principles of transmitter location in the radio networks, beacon-based in-building location and orientation, possible ways for mobile network device location, movement monitoring and practical implementation. 7. An invited lecture on practical communication security incidents. 8. Interferometry, Raman, Brillouin and Rayleigh dispersion and their usage in optical fiber detectors. 9. Principles of key distribution using quantum mechanics (QKD), QKD protocols - BB84, SARG04 and E91, QKD in quantum networks. 10. Network traffic analysis tools - IOS Diagnostic Tools, Packet Capturing, SNMP and Netflow. Traffic analysis based on signatures, advanced behavioral analysis of Netflow data. 11. VoIP security concerns, eavesdropping, content modification, DoS, deliberate service termination and quality degradation. Recommended measures. 12. Honeypots and Honeynets. Design of VoIP Honeypot. 13. Authentication, multifactor authentication, single-sign-on systems and authorization system design based on OpenAuth. 14. Emerging technologies and discussions on future security trends.

Conditions for subject completion

Full-time form (validity from: 2019/2020 Winter semester)
Task nameType of taskMax. number of points
(act. for subtasks)
Min. number of points
Credit and Examination Credit and Examination 100 (100) 51
        Credit Credit 40  15
        Examination Examination 60  20
Mandatory attendence parzicipation: According to the guarantor's recommendation of the course.

Show history

Occurrence in study plans

Academic yearProgrammeField of studySpec.ZaměřeníFormStudy language Tut. centreYearWSType of duty
2021/2022 (N0612A140004) Information and Communication Security IKT P Czech Ostrava 1 Compulsory study plan
2020/2021 (N0612A140004) Information and Communication Security IKT P Czech Ostrava 1 Compulsory study plan
2020/2021 (N2647) Information and Communication Technology (1801T064) Information and Communication Security P Czech Ostrava 1 Compulsory study plan
2019/2020 (N2647) Information and Communication Technology (1801T064) Information and Communication Security P Czech Ostrava 1 Compulsory study plan
2019/2020 (N0612A140004) Information and Communication Security IKT P Czech Ostrava 1 Compulsory study plan

Occurrence in special blocks

Block nameAcademic yearForm of studyStudy language YearWSType of blockBlock owner