General Course Information | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Meeting time: Classroom: Class Webpage: Credits: |
Mon 12:45PM-3:15PM
OM 312 Class Webpage 3 |
|||||||||||||||
Instructor Information | ||||||||||||||||
Name: Office: Tel: fax: Email: Office hours: |
Xiuzhen Cheng SEH 5860 202 994 9751 202 994 4875 cheng AT gwu.edu 10:00AM-12:00PM, Monday. |
|||||||||||||||
TA Information | ||||||||||||||||
Name: Office: Tel: Email: Office hours: |
Chunqiang Hu
SEH chu AT gwmail.gwu.edu 4:00PM-6:00PM, Friday |
|||||||||||||||
Course Description and Objective | ||||||||||||||||
This course will address various issues (attacks and defense
strategies) in wireless and mobile security, including
WEP and WPA, wireless jamming attacks, and movile privacy.
It is intended for Master or Doctoral students who are interested in the current development of wireless and mobile security.
The goal of this course is to familiarize students with the issues and technologies involved in designing a wireless and mobile system that is robust against various attacks. Students will gain an understanding of the various ways in which wireless networks can be attacked and tradeoffs in protecting networks. At the end of this course, students will have a broad knowledge of the state-of-the-art and open problems in wireless and mobile security, thus enhancing their potential to do research or pursue a career in this rapidly developing area. |
||||||||||||||||
Textbooks | ||||||||||||||||
No teextbook is required.
For Background Knowledge:
|
||||||||||||||||
Prerequisites | ||||||||||||||||
Csci 6431 Computer Networks; Csci 6331 Cryptography. | ||||||||||||||||
Method of Instruction | ||||||||||||||||
The course will be taught mainly through lectures, in-class discussions, and projects.
The material in the course is drawn mainly from research literature.
To actively participate in the in-class discussion (required), you need to study the papers before class. These papers will be on-line at least one-week ahead of time. More supplimentary reading materials will be put on the course webpage. Students are strongly recommended to scrutinize part or all of them.
Students are expected to attend all classes and participate in class discussions. The best way to get the most out of this course is to read the papers thoroughly before class and come prepared to engage in lively discussions. In addition to class participation and discussions, students are required to do projects independently. We will have three projects that are strongly related to the course material. |
||||||||||||||||
Method of Evaluation | ||||||||||||||||
Grades will be computed based on the projects only.
Final letter grade will be curved based on the distribution of the overall scores. However, you may expect the following tentative grading scale to evaluate your performance: A's,A-'s:90-100%, B+'s,B's,B-'s:80-89%, C+'s,C's,C-'s:70-79%, D+'s,D's,D-'s:60-69%. |
||||||||||||||||
Course Outline and Schedule (Tentative) | ||||||||||||||||
| ||||||||||||||||
Academic Integrity Policy | ||||||||||||||||
All examinations and other graded work products and assignments are to be completed in accordance with GW Code of Academic Integrity. |