
Semester 1
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-0120 | English Language 1 | 3 | 0 | 1 |
321-1500 | Discrete Mathematics I | 3 | 2 | 5 |
321-1200 | Structured Programming | 3 | 4 | 5 |
321-1400 | Introduction to Computer Science and Communications | 3 | 0 | 5 |
321-2000 | Logic Design | 3 | 2 | 5 |
321-1100 | Mathematics for Engineers I | 3 | 2 | 5 |
321-2400 | Probability and Statistics | 3 | 2 | 5 |
Semester 2
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-0130 | English Language 2 | 3 | 0 | 2 |
321-2100 | Object-Oriented Programming I | 3 | 2 | 5 |
321-2450 | Discrete Mathematics II | 3 | 2 | 5 |
321-3300 | Computer Communications | 3 | 2 | 5 |
321-2550 | Circuit Theory | 3 | 2 | 5 |
321-3150 | Mathematics for Engineers II | 3 | 2 | 5 |
321-2050 | Physics | 3 | 2 | 5 |
Semester 3
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-0140 | English Language 3 | 3 | 0 | 3 |
321-3650 | Object-Oriented Programming II | 3 | 2 | 5 |
321-3350 | Computer Architecture | 3 | 2 | 5 |
321-3000 | Data Structures | 3 | 2 | 5 |
321-5500 | Signals and Systems | 3 | 2 | 5 |
321-3750 | Stochastic Procedures | 3 | 2 | 5 |
321-8950 | Digital Innovation & Entrepreneurship | 3 | 0 | 5 |
Semester 4
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-4200 | Algorithms and Complexity | 3 | 2 | 5 |
321-3100 | Information Systems Analysis and Design | 3 | 2 | 5 |
321-3200 | Databases I | 3 | 2 | 5 |
321-7900 | Electronics | 3 | 2 | 5 |
321-4100 | Operating Systems | 3 | 2 | 5 |
321-4120 | Advanced Topics of Programming Languages | 3 | 2 | 5 |
Semester 5
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-3700 | Databases II | 3 | 2 | 5 |
321-6450 | Computer Networks | 3 | 2 | 5 |
321-6700 | Theory of Computation | 3 | 0 | 5 |
321-2300 | Operation of Business & Information Systems | 3 | 2 | 5 |
321-4000 | Software Engineering | 3 | 2 | 5 |
321-3450 | Telecommunications | 3 | 2 | 5 |
Semester 6
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-3400 | Information and Communication Systems Security | 3 | 2 | 5 |
321-7950 | Distributed Systems | 3 | 2 | 5 |
321-5200 | Information Law | 3 | 0 | 5 |
321-6500 | Information Systems Management | 3 | 0 | 5 |
321-88100 | Internet Programming | 3 | 2 | 5 |
321-3600 | Artificial Intelligence | 3 | 2 | 5 |
Semester 7
Cycle 1: Information and Communication Systems Security and Privacy |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-9700 | Computer Network Security and Privacy Enhancing Technologies | 3 | 0 | 5 |
321-5750 | Privacy and Data Protection Law | 3 | 0 | 5 |
Cycle 2: Information Systems and Entrepreneurship |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-8100 | Project Management | 3 | 2 | 5 |
321-7650 | Systems Theory | 3 | 0 | 5 |
321-5150 | Information Systems Analysis and Design Methodologies | 3 | 0 | 5 |
Cycle 3: Computer and Telecommunication Technologies |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7050 | Digital Systems Design | 3 | 2 | 5 |
321-10300 | Digital Communications | 3 | 2 | 5 |
Cycle 4: Communication Systems and Networks |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-8350 | Network Management | 3 | 0 | 5 |
321-7000 | Performance Evaluation and Simulation of Computer Systems and Networks | 3 | 2 | 5 |
Cycle 5: Information Management and Intelligent Systems |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7750 | Introduction to Robotics | 3 | 2 | 5 |
321-6100 | Natural Language Processing | 3 | 2 | 5 |
Cycle 6: Computer Science Foundations |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-8600 | Information Theory | 3 | 0 | 5 |
Semester 8
Cycle 1: Information and Communication Systems Security and Privacy |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-10750 | Mobile and Wireless Networks Security | 3 | 0 | 5 |
321-6000 | Security on Physical Layer | 3 | 0 | 5 |
321-8050 | Cryptography | 3 | 0 | 5 |
Cycle 2: Information Systems and Entrepreneurship |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-5600 | Human - Computer Interaction and Web Applications | 3 | 2 | 5 |
321-8500 | Decision Support Systems | 3 | 2 | 5 |
321-11100 | Electronic Government Technologies and Applications | 3 | 0 | 5 |
Cycle 3: Computer and Telecommunication Technologies |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7800 | Wireless Communications | 3 | 2 | 5 |
321-8750 | Introduction to VLSI | 3 | 2 | 5 |
321-7850 | Microprocessors | 3 | 2 | 5 |
321-9350 | Digital Image Processing | 3 | 2 | 5 |
Cycle 4: Communication Systems and Networks |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7250 | Mobile Communication Networks | 3 | 2 | 5 |
321-6250 | Internet Protocols and Architectures | 3 | 0 | 5 |
321-11000 | Cloud Technologies | 3 | 2 | 5 |
Cycle 5: Information Management and Intelligent Systems |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-10200 | Information Retrieval | 3 | 0 | 5 |
321-9250 | Data Mining | 3 | 2 | 5 |
321-6050 | Intelligent Recommender Systems | 3 | 0 | 5 |
321-6600 | Advanced Robotics | 3 | 2 | 5 |
Cycle 6: Computer Science Foundations |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-99000 | Numerical Analysis | 3 | 0 | 5 |
321-8000 | Game Theory | 3 | 0 | 5 |
321-9850 | Mathematical Modeling | 3 | 0 | 5 |
321-9000 | Forecasting Techniques | 3 | 0 | 5 |
Optional courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-2630 | 3 | 2 | 5 | |
321-7600 | 3 | 0 | 5 |
Semester 9
Cycle 1: Information and Communication Systems Security and Privacy |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-99100 | Regulatory and Social Issues in Information Society | 3 | 0 | 5 |
Cycle 2: Information Systems and Entrepreneurship |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-5400 | Information Systems Strategy and Investment | 3 | 0 | 5 |
321-8200 | E-Commerce Technologies and Applications | 3 | 0 | 5 |
Cycle 3: Computer and Telecommunication Technologies |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-3250 | Internet of Things | 3 | 2 | 5 |
321-10650 | Satellite Communications | 3 | 2 | 5 |
321-8650 | Optoelectronics | 3 | 2 | 5 |
321-6550 | Multimedia | 3 | 2 | 5 |
Cycle 4: Communication Systems and Networks |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-9400 | Sensor Networks | 3 | 2 | 5 |
321-9120 | Design and Development of Mobile Computing applications | 3 | 2 | 5 |
Cycle 5: Information Management and Intelligent Systems |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-9450 | Applied Topics in Data Structures and Databases | 3 | 0 | 5 |
321-7400 | Knowledge Engineering and Knowledge Systems | 3 | 0 | 5 |
Cycle 6: Computer Science Foundations |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-10000 | Algorithms and Combinatorial Optimization | 3 | 0 | 5 |
Optional courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-2600 | 3 | 0 | 5 |
Semester 10
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7100 | Diploma Thesis | 30 |
Title | Mobile and Wireless Networks Security |
---|---|
Lesson Code | 321-10750 |
Semester | 8 |
ECTS | 5 |
Hours (Theory) | 3 |
Hours (Lab) | 0 |
Faculty | Kambourakis Georgios |
Syllabus
- Introduction to wireless networks security: Wired vs. wireless network security, categories of Threats and the OSI model, Vulnerabilities, Countermeasures, Security architectures.
- IEEE 802.11 standard security issues: Authentication and authorization mechanisms, Confidentiality and Integrity, pre-RSNA protocols (WEP), TSNs (TKIP), RSNA (802.11i), Key management, Threat analysis and case studies.
- Cellular networks security (3GPP): Security issues, Network access and Authentication mechanisms, Key hierarchy and administration, Encryption, Integrity and user Privacy, Inter and Intra-network security, classification of attacks.
Learning Outcomes
This course covers the major security and privacy topics in wireless and mobile networking. The main learning objectives of this course are:
- To conceptualize the idiosyncrasies of wireless terrain in terms of security and privacy.
- Τo impart state-of-the-art technologies of wireless network security.
- Τo analyse the various categories of threats, vulnerabilities, countermeasures in the area of wireless and mobile networking.
- Τo familiarize students with the issues and technologies involved in designing a wireless system that is robust against attack.
The course considers basic security topics and technologies in the following standards: 3GPP GSM/UMTS/LTE, IEEE 802.11. The emphasis is put on the security issues of MAC and upper layers. The aforementioned objectives are fulfilled through course lectures, paper readings, and projects.
Prerequisite Courses
Not required.
Basic Textbooks
- Καμπουράκης, Γ., Γκρίτζαλης, Σ., Κάτσικας, Σ., Ασφάλεια Ασύρματων και Κινητών Δικτύων Επικοινωνιών, Παπασωτηρίου, 2006.
- Forsberg, D., Horn, G., Moeller, W. D., Niemi, V, LTE Security, Wiley, 2011.
- Niemi, V., Nyberg, K., UMTS Security, Wiley, 2003.
- Hardjono, T., Dondeti, L. R., Security in Wireless LANs and MANs, Artech House, 2005.
- Maxim, M., Pollino, D., Wireless Security, RSA Press, 2002.
- Osterhage, W., Wireless Security, CRC Press, 2011.
- Boudriga, N., Security of Mobile Communications, Auerbach Publications, 2009.
- Nakhjiri, M., AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility, Wiley, 2005.
- Aissi, S., Dabbous, N., Prasad, A. R., Security for Mobile Networks and Platforms, Artech House, 2006.
- Buttyan, L., Hubaux, J.-P., Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge University Press, 2007.
- Cayirci, E., Rong, C., Security in Wireless Ad Hoc and Sensor Networks, Wiley, 2009.
- Kambourakis G., Shabtai A., Kolias C., Damopoulos D. (Eds.), Intrusion Detection and Prevention for Mobile Ecosystems, CRC Press, 2017.
- Minella J. and Orr S., Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise, Wiley, 2022.
- Doherty J., Wireless and Mobile Device Security, Jones & Bartlett Learning; 2nd ed., 2021.
- Henry J. et al., Wi-Fi 7 In Depth: Your guide to mastering Wi-Fi 7, the 802.11be protocol, and their deployment, Addison-Wesley Professional, 2024.
Additional References
- IEEE Transactions on Mobile Computing, IEEE Press.
- IEEE Transactions on Wireless Communications, IEEE press.- Wireless Personal Communications, Wliey.
- ACM Transactions on Privacy and Security.
- IEEE Transactions on Dependable and Secure Computing.
- IEEE Security and Privacy Magazine.
- Computers & Security, Elsevier.- International Journal of Information Security, Springer.
- Security and Communication Networks, Wiley.
- Journal of Information Security and Applications, Elsevier.
- IET Information Security, IET.
- Ad Hoc Networks, Elsevier.
- Computer Networks, Elsevier.
- Computer Communications, Elsevier.
- Wireless Networks, Springer.
- Journal on Wireless Communications and Networking (JWCN), Hindawi/Springer.
- Wireless Communications and Mobile Computing, Wiley.
Teaching and Learning Methods
Activity | Semester workload |
---|---|
Lectures | 39 hours |
Projects and personal study | 83 hours |
Final exams | 3 hours |
Course total | 125 hours (5 ECTS) |
Student Performance Evaluation
OPTION I
I. Written examination (50%), which includes:
- Multiple choice questions,
- Short-answer questions
- Problem solving.
II. One or two projects (40%)
III. Class presentation (10%)
OPTION II
Two projects, each with an oral exam (100%).
Language of Instruction and Examinations
Delivery Mode
Face-to-face