Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-0120 | English Language 1 | 3 | 0 | 5 |
321-1500 | Discrete Mathematics I | 3 | 2 | 5 |
321-1200 | Structured Programming | 3 | 4 | 5 |
321-1400 | Introduction to Computer Science and Communications | 3 | 0 | 5 |
321-2000 | Logic Design | 3 | 2 | 5 |
321-1100 | Calculus | 3 | 2 | 5 |
321-2400 | Probability and Statistics | 3 | 2 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-0130 | English Language 2 | 3 | 0 | 5 |
321-2100 | Object-Oriented Programming I | 3 | 2 | 5 |
321-2450 | Discrete Mathematics II | 3 | 2 | 5 |
321-3300 | Computer Communications | 3 | 2 | 5 |
321-2550 | Circuit Theory | 3 | 2 | 5 |
321-3150 | Linear Algebra | 3 | 2 | 5 |
321-2050 | Physics | 3 | 2 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-0140 | English Language 3 | 3 | 0 | 5 |
321-3650 | Object-Oriented Programming II | 3 | 2 | 5 |
321-3350 | Computer Architecture | 3 | 2 | 5 |
321-3000 | Data Structures | 3 | 2 | 5 |
321-5500 | Signals and Systems | 3 | 2 | 5 |
321-3750 | Stochastic Procedures | 3 | 2 | 5 |
321-8950 | Digital Innovation & Entrepreneurship | 3 | 0 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-4200 | Algorithms and Complexity | 3 | 2 | 5 |
321-3100 | Information Systems Analysis and Design II | 3 | 2 | 5 |
321-3200 | Databases I | 3 | 2 | 5 |
321-7900 | Electronics | 3 | 2 | 5 |
321-4100 | Operating Systems | 3 | 2 | 5 |
321-4120 | Advanced Topics of Programming Languages | 3 | 2 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-3700 | Databases II | 3 | 2 | 5 |
321-6450 | Computer Networks | 3 | 2 | 5 |
321-6700 | Theory of Computation | 3 | 0 | 5 |
321-2300 | Operation of Business & Information Systems | 3 | 2 | 5 |
321-4000 | Software Engineering | 3 | 2 | 5 |
321-3450 | Telecommunications | 3 | 2 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-3400 | Information and Communication Systems Security | 3 | 2 | 5 |
321-7950 | Distributed Systems | 3 | 2 | 5 |
321-5200 | Information Law | 3 | 0 | 5 |
321-6500 | Information Systems Management | 3 | 0 | 5 |
321-88100 | Internet Programming | 3 | 2 | 5 |
321-3600 | Artificial Intelligence | 3 | 2 | 5 |
Cycle 1: Information and Communication Systems Security and Privacy |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-9700 | Computer Network Security and Privacy Enhancing Technologies | 3 | 0 | 5 |
321-5750 | Privacy and Data Protection Law | 3 | 0 | 5 |
Cycle 2: Information Systems and Entrepreneurship |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-8100 | Project Management | 3 | 2 | 5 |
321-7650 | and Tools | 3 | 0 | 5 |
321-5150 | Information Systems Analysis and Design Methodologies | 3 | 0 | 5 |
Cycle 3: Computer and Telecommunication Technologies |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7050 | Digital Systems Design | 3 | 2 | 5 |
321-10300 | Digital Communications | 3 | 2 | 5 |
Cycle 4: Communication Systems and Networks |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-8350 | Network Management | 3 | 0 | 5 |
321-7000 | Performance Evaluation and Simulation of Computer Systems an | 3 | 2 | 5 |
Cycle 5: Information Management and Intelligent Systems |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7750 | Introduction to Robotics | 3 | 2 | 5 |
321-6100 | Natural Language Processing | 3 | 0 | 5 |
Cycle 6: Computer Science Foundations |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-8600 | Information Theory | 3 | 0 | 5 |
Cycle 1: Information and Communication Systems Security and Privacy |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-10750 | Mobile and Wireless Networks Security | 3 | 0 | 5 |
321-6000 | Security on Physical Layer | 3 | 0 | 5 |
321-8050 | Cryptography | 3 | 0 | 5 |
Cycle 2: Information Systems and Entrepreneurship |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-5600 | Human - Computer Interaction and Web Applications | 3 | 2 | 5 |
321-8500 | Decision Support Systems | 3 | 2 | 5 |
321-11100 | Electronic Government Technologies and Applications | 3 | 0 | 5 |
Cycle 3: Computer and Telecommunication Technologies |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7800 | Wireless Communications | 3 | 2 | 5 |
321-8750 | Introduction to VLSI | 3 | 2 | 5 |
321-7850 | Microprocessors | 3 | 2 | 5 |
321-9350 | Digital Image Processing | 3 | 2 | 5 |
Cycle 4: Communication Systems and Networks |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7250 | Mobile Communication Networks | 3 | 2 | 5 |
321-6250 | Internet Protocols and Architectures | 3 | 0 | 5 |
321-11000 | Cloud Technologies | 3 | 2 | 5 |
Cycle 5: Information Management and Intelligent Systems |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-10200 | Information Retrieval | 3 | 0 | 5 |
321-9250 | Data Mining | 3 | 2 | 5 |
321-6050 | Intelligent Recommender Systems | 3 | 0 | 5 |
321-6600 | Computer Vision | 3 | 2 | 5 |
Cycle 6: Computer Science Foundations |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-99000 | Numerical Analysis | 3 | 0 | 5 |
321-8000 | Game Theory | 3 | 0 | 5 |
321-9850 | Mathematical Modeling | 3 | 0 | 5 |
321-9000 | Forecasting Techniques | 3 | 0 | 5 |
Optional courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-2630 | 3 | 2 | 5 | |
321-7600 | 3 | 0 | 5 |
Cycle 1: Information and Communication Systems Security and Privacy |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-99100 | Regulatory and Social Issues in Information Society | 3 | 0 | 5 |
Cycle 2: Information Systems and Entrepreneurship |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-5400 | Information Systems Strategy and Investment | 3 | 0 | 5 |
321-8200 | E-Commerce Technologies and Applications | 3 | 0 | 5 |
Cycle 3: Computer and Telecommunication Technologies |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-3250 | Internet of Things | 3 | 2 | 5 |
321-10650 | Satellite Communications | 3 | 2 | 5 |
321-8650 | Optoelectronics | 3 | 2 | 5 |
321-6550 | Multimedia | 3 | 2 | 5 |
Cycle 4: Communication Systems and Networks |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-9400 | Sensor Networks | 3 | 2 | 5 |
321-9120 | Design and Development of Mobile Computing applications | 3 | 2 | 5 |
Cycle 5: Information Management and Intelligent Systems |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-9450 | Applied Topics in Data Structures and Databases | 3 | 0 | 5 |
321-7400 | Knowledge Engineering and Knowledge Systems | 3 | 0 | 5 |
Cycle 6: Computer Science Foundations |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-10000 | Algorithms and Combinatorial Optimization | 3 | 0 | 5 |
Optional courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-2600 | 3 | 0 | 5 |
Compulsory courses |
||||
---|---|---|---|---|
Lesson Code | Title | H(T) | H(L) | ECTS |
321-7100 | Degree Thesis | 30 |
Title | Mobile and Wireless Networks Security |
---|---|
Lesson Code | 321-10750 |
Semester | 8 |
ECTS | 5 |
Hours (Theory) | 3 |
Hours (Lab) | 0 |
Faculty | Kambourakis Georgios |
- Introduction to wireless networks security: Wired vs. wireless network security, categories of Threats and the OSI model, Vulnerabilities, Countermeasures, Security architectures.
- IEEE 802.11 standard security issues: Authentication and authorization mechanisms, Confidentiality and Integrity, pre-RSNA protocols (WEP), TSNs (TKIP), RSNA (802.11i), Key management, Threat analysis and case studies.
- Cellular networks security (3GPP): Security issues, Network access and Authentication mechanisms, Key hierarchy and administration, Encryption, Integrity and user Privacy, Inter and Intra-network security, classification of attacks.
This course covers the major security and privacy topics in wireless and mobile networking. The main learning objectives of this course are:
- To conceptualize the idiosyncrasies of wireless terrain in terms of security and privacy.
- Τo impart state-of-the-art technologies of wireless network security.
- Τo analyse the various categories of threats, vulnerabilities, countermeasures in the area of wireless and mobile networking.
- Τo familiarize students with the issues and technologies involved in designing a wireless system that is robust against attack.
The course considers basic security topics and technologies in the following standards: 3GPP GSM/UMTS/LTE, IEEE 802.11. The emphasis is put on the security issues of MAC and upper layers. The aforementioned objectives are fulfilled through course lectures, paper readings, and projects.
Not required.
- Καμπουράκης, Γ., Γκρίτζαλης, Σ., Κάτσικας, Σ., Ασφάλεια Ασύρματων και Κινητών Δικτύων Επικοινωνιών, Παπασωτηρίου, 2006.
- Forsberg, D., Horn, G., Moeller, W. D., Niemi, V, LTE Security, Wiley, 2011.
- Niemi, V., Nyberg, K., UMTS Security, Wiley, 2003.
- Hardjono, T., Dondeti, L. R., Security in Wireless LANs and MANs, Artech House, 2005.
- Maxim, M., Pollino, D., Wireless Security, RSA Press, 2002.
- Osterhage, W., Wireless Security, CRC Press, 2011.
- Boudriga, N., Security of Mobile Communications, Auerbach Publications, 2009.
- Nakhjiri, M., AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility, Wiley, 2005.
- Aissi, S., Dabbous, N., Prasad, A. R., Security for Mobile Networks and Platforms, Artech House, 2006.
- Buttyan, L., Hubaux, J.-P., Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing, Cambridge University Press, 2007.
- Cayirci, E., Rong, C., Security in Wireless Ad Hoc and Sensor Networks, Wiley, 2009.
- Kambourakis G., Shabtai A., Kolias C., Damopoulos D. (Eds.), Intrusion Detection and Prevention for Mobile Ecosystems, CRC Press, 2017.
- Minella J. and Orr S., Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise, Wiley, 2022.
- Doherty J., Wireless and Mobile Device Security, Jones & Bartlett Learning; 2nd ed., 2021.
- Henry J. et al., Wi-Fi 7 In Depth: Your guide to mastering Wi-Fi 7, the 802.11be protocol, and their deployment, Addison-Wesley Professional, 2024.
- IEEE Transactions on Mobile Computing, IEEE Press.
- IEEE Transactions on Wireless Communications, IEEE press.- Wireless Personal Communications, Wliey.
- ACM Transactions on Privacy and Security.
- IEEE Transactions on Dependable and Secure Computing.
- IEEE Security and Privacy Magazine.
- Computers & Security, Elsevier.- International Journal of Information Security, Springer.
- Security and Communication Networks, Wiley.
- Journal of Information Security and Applications, Elsevier.
- IET Information Security, IET.
- Ad Hoc Networks, Elsevier.
- Computer Networks, Elsevier.
- Computer Communications, Elsevier.
- Wireless Networks, Springer.
- Journal on Wireless Communications and Networking (JWCN), Hindawi/Springer.
- Wireless Communications and Mobile Computing, Wiley.
Activity | Semester workload |
---|---|
Lectures | 39 hours |
Projects and personal study | 83 hours |
Final exams | 3 hours |
Course total | 125 hours (5 ECTS) |
OPTION I
I. Written examination (50%), which includes:
- Multiple choice questions,
- Short-answer questions
- Problem solving.
II. One or two projects (40%)
III. Class presentation (10%)
OPTION II
Two projects, each with an oral exam (100%).
Face-to-face