Qualifications and Certificates
  Awards and Honors
  Technical Committee Member
  In the News
  Professional Experience
  Professional Memberships
  Auxiliary Activities
 Wireless Network Security
Wireless networks and wireless communications technology have the potential to make universal Internet use a reality, which will clearly lead to global connectivity, roaming, and ubiquitous communications. Meanwhile, the risk of threats to security grows and the need for secure wireless networks becomes of paramount concern. In this course, students gain the skills to defend against attacks and maintain security within wireless networks. Also, they will understand weakness in existing networks and design and configure a cost-effective security solution.
Language: The class is taught in English.
Assistant: Select one student to manage, handle and collect the assignments, projects, and LAB activities.
Final Examination: Written examination, (40%)
Coursework 1: A 6 page paper (in a team of two students), (30%)
Coursework 2: A Project and Presentation (individually) , (30%)
Lecture Notes
Session 01
Ad-hoc routing and security, class hand-out
Session 02
Destination-Sequenced Distance Vector Protocol and cluster based networks
Session 03
Dynamic Source Routing Protocol; Ad Hoc On-Demand Distance-Vector Protocol
Session 04
Securing Ad Hoc Networks, Mitigating Routing Mis-behaviour in Mobile ad hoc networks
Session 05
Secure Routing for Mobile Ad hoc Networks, Using the Fluhrer, Mantin, and Shamir Attack to Break WEP, A Secure Routing Protocol for Ad Hoc Networks, Scalable Routing Strategies for Ad Hoc Wireless Networks
Session 06
Adaptive Security for Multi-layer Ad-hoc Networks, Intrusion detection in wireless ad-hoc networks, Self-certified keys -- Concepts and Applications
Session 07
Defining the Continuum of Trust, A Network-Centric Approach to Embedded Software for Tiny Devices., Active Message Communication for Tiny Network Sensors
Session 08
Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc, Performance Comparison of two on-demand routing protocols for ad hoc networks
Session 09
On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks, Overlay Networks, Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks, Security on the Move: Indirect Authentication using Kerberos
Session 10
Generating RSA Keys on a Handheld Using an Untrusted Server, Providing Robust and Ubiquitous Security Support for Mobil Ad Hoc Networks
Session 11
Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems, SEAD Secure Efficient Distance Vector Routing for Mobile Wireless Ad-Hoc networks, Self-securing ad-hoc wireless networks
Session 12
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, Course Review
New Brunswick, Canada