GAZI UNIVERSITY INFORMATION PACKAGE - 2019 ACADEMIC YEAR

COURSE DESCRIPTION
MOBILE NETWORK SECURITY/5181310
Course Title: MOBILE NETWORK SECURITY
Credits 3 ECTS 8
Semester 1 Compulsory/Elective Elective
COURSE INFO
 -- LANGUAGE OF INSTRUCTION
  Turkish
 -- NAME OF LECTURER(S)
  Lecturer. Dr. Muhammet ÜNAL
 -- WEB SITE(S) OF LECTURER(S)
  w3.gazi.edu.tr/~muhunal
 -- EMAIL(S) OF LECTURER(S)
  muhunal@gazi.edu.tr
 -- LEARNING OUTCOMES OF THE COURSE UNIT
Learning Fundamentals of Wireless Networks
Wireless Network security needs
Cryptographic protocols
Security of existing Wireless Networks
Security of emerging Wireless Networks
Secure addressing and naming
LEAP+, ChanPS, HubauxBC, URSA
KarlofWagner, Wormhole attacks, Ariadne, tinySeRSync, CapkunRCS, MolnarWagner, CapkunHJ

 -- MODE OF DELIVERY
  Distance Learning
 -- PREREQUISITES AND CO-REQUISITES
  There is no prerequisite or co-requisite for this course.
 -- RECOMMENDED OPTIONAL PROGRAMME COMPONENTS
  There is no recommended optional programme component for this course.
 --COURSE CONTENT
1. Week  Fundamentals of Wireless Networks
2. Week  Wireless Network security needs
3. Week  Cryptographic protocols
4. Week  Security of existing Wireless Networks
5. Week  Security of emerging Wireless Networks
6. Week  Secure addressing and naming
7. Week  Establishing Security Associations (rd, spins, LEAP+)
8. Week  Establishing Security Associations (ChanPS, HubauxBC, URSA)
9. Week  Establishing Security Associations (URSA)
10. Week  Secure routing (KarlofWagner)
11. Week  Secure routing (Wormhole attacks)
12. Week  Secure routing (Ariadne)
13. Week  Secure Services and Applications (tinySeRSync, CapkunRCS)
14. Week  Secrecy and Privacy (MolnarWagner, CapkunHJ)
15. Week  
16. Week  
 -- RECOMMENDED OR REQUIRED READING
  "Security and Cooperation in Wireless Networks", Levente Buttyan and Jean-Pierre Hubaux, , Cambridge University Press, ISBN 9780521873710 “Network Security: Private Communication in a Public World (2nd Edition)”, by Charlie Kaufman,Radia Perlman, and Mike Speciner, Prentice Hall, ISBN-10: 0130460192 "Guide to Wireless Network Security", John Vacca, Springer
 -- PLANNED LEARNING ACTIVITIES AND TEACHING METHODS
  Lecture, Seminar Project
 -- WORK PLACEMENT(S)
  -
 -- ASSESSMENT METHODS AND CRITERIA
 
Quantity
Percentage
 Mid-terms
1
20
 Assignment
7
20
 Exercises
0
0
 Projects
0
0
 Practice
0
0
 Quiz
0
0
 Contribution of In-term Studies to Overall Grade  
40
 Contribution of Final Examination to Overall Grade  
60
 -- WORKLOAD
 Efficiency  Total Week Count  Weekly Duration (in hour)  Total Workload in Semester
 Theoretical Study Hours of Course Per Week
14
3
42
 Practising Hours of Course Per Week
14
3
42
 Reading
12
2
24
 Searching in Internet and Library
12
2
24
 Designing and Applying Materials
1
3
3
 Preparing Reports
0
 Preparing Presentation
0
 Presentation
0
 Mid-Term and Studying for Mid-Term
1
3
3
 Final and Studying for Final
1
8
8
 Other
14
3
42
 TOTAL WORKLOAD: 
188
 TOTAL WORKLOAD / 25: 
7.52
 ECTS: 
8
 -- COURSE'S CONTRIBUTION TO PROGRAM
NO
PROGRAM LEARNING OUTCOMES
1
2
3
4
5
1Improves and deepens the field knowledge at an expert level based on undergraduate proficiency.X
2Comprehends the interactions between the computer science and other related disciplines.X
3Uses expert level theoretical and practical knowledge acquired in the computer science field.X
4Creates new knowledge by integrating the computer science knowledge and the knowledge from related disciplines.X
5Defines a problem in the computer science field.X
6Analyses the problems in the computer science field by using scientific research methods.X
7Proposes solutions to the problems in the computer science field.X
8Solves problems in the computer science field.X
9Evaluates the results within perspectives of quality processes.X
10Develops new approaches and methods by taking responsibility in complex situations in the application stages.X