Wireless Standards Security: Vulnerabilities in existing Wireless networks, Bluetooth Security, 3G Security, Wifi Security. Trends and Upcoming Wireless Networks: Upcoming Wireless Networks, Trends and Security challenges in wireless networks. Trust Assumptions and Adversary models: Trust, Trust in Ubiquitous computing. Physical Layer Security: Jamming, Wiretapping, Physical Layer defenses. MAC Layer Security: Operating principles of IEEE 802.11, Detecting selfish behavior in hotspots, Selfish behavior in pure ad hoc networks, MAC layer defenses. Network Layer Security: Securing ad hoc network routing protocols, Secure routing in sensor networks, Network layer defenses. Privacy in Wireless Networks: Privacy in RFID Systems, Location privacy in vehicular networks, Privacy preserving routing in ad hoc networks. Game Theory: Normal Form Games, Strict Dominance, Weak Dominance, Iterated Dominance, Pure and Mixed Strategy Nash Equilibrium, Extensive Form Games, Backward Induction, Subgame Perfect Nash Equilibrium, Game Theory in Wireless Networks, Forwarder's dilemma, Joint Packet Forwarding game, Multiple Access Game and Jamming Game. Applications: RFID Security, Security for Wireless Sensor Networks, Security for Vehicular Networks.