5.00
(1 Rating)

Wireless Security: From Cryptography to PHY Layer Security

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Wireless Security: From Cryptography to PHY Layer Security

This wireless security course is designed to make students familiar with the main security requirements, security vulnerabilities, threats, and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical layer security (PLS) against eavesdropping, and wireless jamming attacks and their countermeasures, know the main methods of physical-layer authentication, and be aware of some of the open challenges and recommendations in the wireless security domain.

The main objective of this wireless security course is to introduce the students to the field of wireless security and its importance, compare between wired and wireless security, review OSI layers and state their security mechanisms, discuss the security requirements, security vulnerabilities and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security against eavesdropping, and learn wireless jamming attacks and their countermeasures, and state some open challenges and recommendations.

This course will discuss a variety of topics including the differences between the wireless network and wired network, wireless technical standards, and current and future applications of wireless technology. The course will also examine the challenges and types of (WS), its vulnerabilities, and security issues. Lastly, the course will discuss securing wireless technology and its future.

What Will You Learn?

  • Be aware of the types of wireless networks. Know the benefits, advantages, and pitfalls of wireless networks. Determine if wireless security is truly secure.
  • Be aware of the different types of wireless security.
  • Know the different ways to secure wireless technology.
  • Know the future of both wireless technology and its security.
  • Understanding the meaning of wireless security and knowing its importance.
  • Becoming familiar with the security requirements of wireless networks.
  • Becoming familiar with the security vulnerabilities and attacks in wireless networks.
  • Learning the security defense protocols and paradigms for wireless networks Learning wireless physical-layer security techniques against eavesdropping, and wireless jamming attacks and their countermeasures. 

Who this course is for:

  1. Undergrad students and recent graduates looking to get a foothold in the wireless security Industry.
  2. Individuals and businesses wanting to reduce security risks and avoid potential financial losses.
  3. Businesses looking to prevent (WS) attacks.
  4. Technical managers and engineers wanting to plan a wireless security strategy.
  5. Technical IT professionals learning about wireless networks and security technologies.

About the course instructor: Dr. Jehad Hamamreh

Dr. Jehad M. HAMAMREH is a Ph.D. holder with more than 15 years of experience in training, coaching, and researchHe is among the Word’s Top Experts in the field of Wireless Communications, Wireless Security, Physical Layer Security, Data Analytics, Wireless Sensing, Open RAN, 5G, 6G, IoT, ML, and AI. He is a best-seller and an author of more than 100 research papers and an inventor of more than 20 patents.

  • The Founder and Director of WISLABi.com for providing practical wireless research innovations.
  • A Board Member at Researcherstore.com for helping academics monetize research and teaching assets by converting them into digital products (No more exploitation by publishers to authors!).
  • A. Prof. at Antalya International/Bilim University (ECE Department).
  • An Editor at RS-OJICT (rs-ojict.pubpub.org) and Frontiers in Communications and Networks.
  • An Investigator and panelist consultant for many funding agencies and governmental organizations.
  • A Reviewer in more than 25 peer-reviewed scientific Journals, and TCP committee member and organizer for many international conferences.
  • An early member of the massive Telcom. Infra Project (TIP).
  • Worked previously as a Researcher at the Department of Electrical and Computer Engineering at Texas A&M University as well as at CoSINC, Medipol University.

=========== Contributions Portfolio:

  • He is the inventor of more than 20 Patents. Mostly known as the inventor of keyless perfect secrecy using diversity, Number Modulation, and Power Modulation in OFDM and MIMO systems, as well as Advanced NOMA.
  • An author of more than 90 peer-reviewed scientific papers.
  • An author of 2 books and 8 book chapters in 6 different books.
  • An author of more than 10 training technical courses.
  • His innovative patented works won gold, silver, and bronze medals in numerous international invention contests and fairs.
  • Received the top researcher award of ABU three times, 2018, 2021, 2022.

=========== Research Interests:

  • His current research interests include Wireless Communication, Wireless Security, Wireless Sensing, O-RAN, 5G/6G, IoT, AI/ML, wireless physical and MAC layers security, orthogonal frequency-division multiplexing (OFDM), multiple-input multiple-output systems (MIMO), advanced waveforms design, multidimensional modulation techniques, and orthogonal/non-orthogonal multiple access schemes for future wireless systems.
  • Key Research Topics: Wireless Communication, Wireless Security (PLS), Data Analytics, Wireless Sensing, Open RAN, 5G/6G, IoT-AI
  • Email: [email protected]

=========== Links and Profiles:

 

Show More

What Will You Learn?

  • Be aware of the types of wireless networks.
  • Know the benefits, advantages and pitfalls of wireless networks.
  • Determine if wireless security is truly secure.
  • Be aware of the different types of wireless security.
  • Know the different ways to secure wireless technology.
  • Know the future of both wireless technology and its security.
  • Understanding the meaning of wireless security and knowing its importance.
  • Becoming familiar with the security requirements of wireless networks.
  • Becoming familiar with the security vulnerabilities and attacks in wireless
  • networks.
  • Learning the security defense protocols and paradigms for wireless networks
  • Learning wireless physical-layer security techniques against eavesdropping, and
  • wireless jamming attacks and their countermeasures.

Course Content

Wireless Security

  • 01:34
  • About the Instructor Dr. Jehad Hamamreh
    03:08
  • Introduction, motivation & main content (syllabus) of the Wireless Security Course
    46:52
  • Comparing wired to wireless to understand their security
    35:55
  • The OSI layers functionalities and protocols in wireless communication networks
    01:01:18
  • Security Requirements in Wireless Networks
    17:57
  • Security attacks at the Physical, MAC, Network, Transport, & Application Layers
    35:06
  • WireShark Introduction Presentation by Yazeed
    20:10
  • How to prevent security attacks at different OSI layers
    38:36
  • 28:37
  • Introduction to physical layer security and its motivation
    20:43
  • A summary review of the WS topics discussed in the previous lectures
    34:53
  • The security methods that exist in current wireless networks
    51:44
  • Multi-factor authentication in wireless communication networks
    32:09
  • 5G Security, Applications, Services, and Main Technologies
    37:06
  • 5G Security landscape
    35:53
  • Security and Privacy in 5G Systems and Networks
    33:45
  • Security issues related to virtualization in 5G Networks
    24:07
  • Wireless physical layer security concept and its main methods
    37:43
  • How cryptography is going against the requirements of future IoT?
    32:15
  • Wireless Security – Jamming Types and DoS Attacks – Lecture 8 Part 1
    32:09
  • Wireless Security – Physical Layer Authentication (PLA) – Lecture 8 by Dr M. Furqan part2
    36:48
  • Wireless Security – Physical Layer Authentication (PLA) – Lecture 8 by Dr M. Furqan part3
    09:00
  • Wireless Security – Physical Layer Authentication (PLA) – Lecture 9 by Dr M. Furqan part1
    28:27
  • Wireless Security – Physical Layer Authentication (PLA) – Lecture 9 by Dr M. Furqan part4
    44:46
  • Physical layer security concept: Wireless security Lecture #10 – part 1
    30:48
  • Physical layer security model and examples: Wireless security Lecture #10 – part 2
    01:14:59
  • Short part of one of the lecture series on Wireless Security Training Course – Lecture 1 Part 2
    05:35
  • WaveFarer Radar Analysis with Diffuse Scattering and Backscatter Through Walls
    49:29
  • Python WiFi DoS (Denial of Service) attack
    17:42
  • New Vulnerabilities in 5G Networks
    43:35
  • Physical-Layer Security: Bounds, Codes and Protocols (João Barros) – Part 1 (SPCodingSchool)
    01:22:49
  • Physical Layer Security: Bounds, Codes and Protocols (João Barros) – Part 2 (SPCodingSchool)
    01:24:32
  • Physical Layer Security in Wireless Networks by Vincent Poorsson
    01:25:58
  • Mathematics Seminar: Physical Layer Security in Wireless Networks | H. Vincent Poor
    01:15:57
  • Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability
    12:11
  • Physical Layer Security in Wireless Communication using NI-USRP kits
    02:25
  • jiska: Wireless Physical Layer Security
    47:18
  • GRCon17 – SDR Implementation of Physical Layer Security through Artificial Noise – Kevin Ryland
    29:55
  • Learn Network Attacks Using Wireshark
    10:07
  • “Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks”
    01:11:03
  • Physical Layer Security
    05:41
  • Georges Kaddoum – ÉTS Research Chair on Physical Layer Security in Wireless Networks
    03:15
  • Putin Informs Hacking Expert Megyn Kelly That She Has No Idea What She’s Talking About
    04:49
  • Wireless Security Presentation on Kali Linux
    10:22
  • Wireless Security Presentation on Anonymity and TOR
    38:36
  • Creating New Human Senses | David Eagleman | Talks at Google
    50:50
  • Wireless Security Course Final Lecture
    01:02:10

Student Ratings & Reviews

5.0
Total 1 Rating
5
1 Rating
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
M
3 years ago
This is one of the best and very rare courses on the domain of wireless physical layer security.