Back close

Course Detail

Course Name Network and Application Security
Course Code 25WN736
Program M.Tech. Wireless Networks & Applications (Specialising in IoT, AI, 5G, Blockchain) (For Working Professionals & Regular Students)
Credits 3
Campus Amritapuri

Syllabus

Syllabus

Introduction, Network Security Model, Types of threats, Linux Security Overview, Malware Primer, Application vulnerabilities, Social Engineering attack techniques and prevention steps, Cryptography Primer – Symmetric keys for data encryption, asymmetric keys for secure key distribution, Diffie-Hellman Key Exchange. Integrity checking with hashes and MACs, User and host identity verification, Detecting and preventing system and network intrusions, Confidentiality with SSL and IPSec tunneling. 

Overview of various wireless technologies, protocols, systems and applications and the respective security concerns and challenges – WLAN, WMAN, WPAN, WMN, WS[A]N, MANET, VANET, Smart Home, Smart Grid, Security considerations for various layers of the wireless protocol stack, Cross-layer attack and defense. Enterprise Wireless LAN security, Trust and reputation management, Synchronization & Localization based attacks and mitigation strategies, Smart Grid security, Telecom system and infrastructure attacks, Mobile App and OS security, PAN security, IoT security 

Objectives and Outcomes

Course Outcome Statements (CO) 

CO1: 

Understanding and appreciation of the nature and kind of threats, vulnerabilities and defences in various wireless networks and technologies 

CO2: 

Ability to design, analyse and propose threat models for real-world practical systems and applications based on wireless technologies 

CO3

Ability to perform ethical hacking of systems and networks to expose the potential security holes in their design and deployment

CO4:  

Familiarity with the cross-layer attack and defence strategies in wireless networks and systems 

CO5: 

Exposure to the potential security threats in the use of mobile apps and social networks 

 

CO-PO AFFINITY MAP 

PO 

PO1 

PO2 

PO3 

PO4 

PO5 

PO6 

PO7 

PO8 

PS01 

PSO2 

PSO3 

CO 

CO1 

 

 

 

CO2 

– 

 

 

 

CO3 

– 

 

 

 

CO4 

 

 

 

CO5 

– 

 

 

 

Text Books / References

  1. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security: PRIVATECommunication in a PUBLIC world”, Second Edition, Prentice Hall, 2002. 
  2. Patrick Tague, “Wireless Network & System Security Group”, CMU-SV, http://wnss.sv.cmu.edu/courses/ 

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now