Course: Wireless Network Security

Lecturer: Rubinstein

Location: MH225

Times:

1

T 7/14

9:00 - 10:30

2

Th 7/16

9:00 - 10:30

3

Th 7/16

10:45 - 12:00

4

W 7/22

13:15 - 14:45

5

W 7/22

15:00 - 16:30

6

Th 7/23

13:15 - 14:45

7

Th 7/23

15:00 - 16:30

8

F 7/24

13:15 - 14:45

9

F 7/24

15:00 - 16:30

 

Student Roster:

BAYARTOGTOKH

Turbat

CSULB

BUJARD

Alexandre

HEIG-VD

Broennimann

Florian

HEIG-VD

Buddhadev

Namrata

SJSU

CHAU

Trevor

CSULB

Cornu

Romain

HEIG-VD

DONFOUET ZANGUE

Brice

HEIG-VD

DONGRE

Ankush

CSULB

DUBOSSON

Aurelien

HEIG-VD

Di Fulvio

Marco

HEIG-VD

Dinant

Gabriel

HEIG-VD

FOALENG TAFE

Raoul Landry

HEIG-VD

Gupta

Payal

SJSU

Ikekoka

Steve

SJSU

Keller

S�bastien

HEIG-VD

Lala

Alain

HEIG-VD

Molla

Daniel

HEIG-VD

PALACIO

Daniel Sepulveda

CSULB

RANDOLPH

April

ASU

ROBERT

Vincent

HEIG-VD

Rayroud

Christian

HEIG-VD

Rinaldini

Julien

HEIG-VD

SPINNENHIRN

Fabian

ASU

Steiner

Pierre

HEIG-VD

WEHRLI

Johan

HEIG-VD

Zahiti

Jetemir

HEIG-VD

 

Description

Security II: Wireless Network Security

Instructor: Abraham Rubinstein, HEIG-VD Switzerland

Evaluation: final exam, lab assignments

Prerequisites:�����������������������������������

         Knowledge of communication protocols

         LAN technologies (Ethernet)

 

Wireless technology is becoming ubiquitous, not only at home and at the work place, but also in public places with companies like Google offering the service for free in entire cities. Although the use of Wireless LAN brings with it increased mobility and the flexibility for the users, it can also be the source of considerable security risks, reliability problems and of low quality of service. These problems can be dealt with and solved with the proper level of knowledge of the technology.

 

This course will cover both theoretical and practical aspects of IEEE 802.11x networks, including a review of applicable standards, the protocol architecture, CSMA/CA, RTS/CTS and contention free access mode protocols, wireless security, including the weaknesses of WEP and WPA, physical layer channels in the ISM band, frequency reutilization, layer-2 wireless roaming, and troubleshooting aspects.