{"id":38013,"date":"2021-07-04T16:53:43","date_gmt":"2021-07-04T13:53:43","guid":{"rendered":"https:\/\/researcherstore.com\/?post_type=courses&p=38013"},"modified":"2023-04-19T14:02:01","modified_gmt":"2023-04-19T11:02:01","slug":"wireless-security","status":"publish","type":"courses","link":"https:\/\/researcherstore.com\/courses\/wireless-security\/","title":{"rendered":"Wireless Security: From Cryptography to PHY Layer Security"},"content":{"rendered":"
\n

Wireless Security: From Cryptography to PHY Layer Security<\/h4>\n

This wireless security course is designed to make students familiar with the main security requirements, security vulnerabilities, threats, and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless<\/a> physical layer security (PLS) against eavesdropping, and wireless jamming attacks and their countermeasures, know the main methods of physical-layer authentication, and be aware of some of the open challenges and recommendations in the wireless security domain.<\/strong><\/p>\n

The main objective of this wireless security course is to introduce the students to the field of wireless security and its importance, compare between wired and wireless security, review OSI layers and state their security mechanisms, discuss the security requirements, security vulnerabilities and attacks in wireless networks (WIFI, LTE-4G, 5G), learn the security defense protocols and paradigms for wireless networks, understand wireless physical-layer security against eavesdropping, and learn wireless jamming attacks and their countermeasures, and state some open challenges and recommendations.<\/strong><\/p>\n

This course will discuss a variety of topics including the differences between the wireless network and wired network, wireless technical standards, and current and future applications of wireless technology. The course will also examine the challenges and types of (WS), its vulnerabilities, and security issues. Lastly, the course will discuss securing wireless technology and its future.<\/strong><\/em><\/p>\n

What Will You Learn? <\/strong><\/h4>\n