440-4123/01 – Selected Issues of Communications Security (VPBK)
Gurantor department | Department of Telecommunications | Credits | 4 |
Subject guarantor | prof. Ing. Miroslav Vozňák, Ph.D. | Subject version guarantor | prof. Ing. Miroslav Vozňák, Ph.D. |
Study level | undergraduate or graduate | Requirement | Compulsory |
Year | 1 | Semester | summer |
| | Study language | Czech |
Year of introduction | 2019/2020 | Year of cancellation | |
Intended for the faculties | FEI | Intended for study types | Follow-up Master |
Subject aims expressed by acquired skills and competences
The aim of the subject is to familiarize the students with theoretical and especially practical aspects of communications security. After the subject completion students will be able to orient especially in the security of wireless networks and other domains such as the quantum cryptography, Netflow analysis or honeypots/honeynets.
Teaching methods
Lectures
Seminars
Summary
The subject focuses on the selected hot issues of communications security. First half of the course is dedicated to the security of wireless and mobile networks. In the second part, students familiarize themselves with optical fiber sensors for security purposes, the quantum cryptography, NetFlow analysis and honeypots/honeynets. Selectes issues come more or less from outcomes of research projects solved by VŠB-TUO.
Compulsory literature:
[1] CHAOUCHI, H., LAURENT-MACKANIVICIUS, M. Wireless and Mobile Network Security, Wiley; 1 edition, 744 pages, 2009.
Recommended literature:
[1] SPITZNER, L. Honeypots: tracking hackers. Addison-Wesley, 2003.
Additional study materials
Way of continuous check of knowledge in the course of semester
4 evaluated tasks from the presented topics(40 points overall)
1/ Abuse of weakness in wireless or mobile networks and breaking, practical task, W5 (10 points)
2 / In-door or out-door localization monitoring, practical task, W8 (10 points)
3 / Design of quantum networks, QKD simulator or QN, W10 (10 points)
4 / Analysis of data from Netflow of network elements or data captured on hoenypots, W12 (10 points)
E-learning
Other requirements
No additional requirements are placed on the student.
Prerequisities
Subject has no prerequisities.
Co-requisities
Subject has no co-requisities.
Subject syllabus:
1. The introduction to communications security concerns, technology overview, the relation to other subjects and topics.
2. Wireless networks vulnerabilities, CUDA-base WiFi network penetration tests.
3. Security concerns of wireless sensor networks, message delivery blocking, message faking and eavesdropping, sensor manipulation.
4. Mobile networks vulnerabilities, active GSM network jamming, UMTS and LTE jamming resilience, base station faking and scanning, IMSI and content sniffing.
5. Eavesdropping in the mobile networks and its detection, encryption profiles in various technologies, known security weaknesses of GSM (A5 cipher), location and traffic data mining.
6. Principles of transmitter location in the radio networks, beacon-based in-building location and orientation, possible ways for mobile network device location, movement monitoring and practical implementation.
7. An invited lecture on practical communication security incidents.
8. Interferometry, Raman, Brillouin and Rayleigh dispersion and their usage in optical fiber detectors.
9. Principles of key distribution using quantum mechanics (QKD), QKD protocols - BB84, SARG04 and E91, QKD in quantum networks.
10. Network traffic analysis tools - IOS Diagnostic Tools, Packet Capturing, SNMP and Netflow. Traffic analysis based on signatures, advanced behavioral analysis of Netflow data.
11. VoIP security concerns, eavesdropping, content modification, DoS, deliberate service termination and quality degradation. Recommended measures.
12. Honeypots and Honeynets. Design of VoIP Honeypot.
13. Authentication, multifactor authentication, single-sign-on systems and authorization system design based on OpenAuth.
14. Emerging technologies and discussions on future security trends.
Conditions for subject completion
Occurrence in study plans
Occurrence in special blocks
Assessment of instruction