Professional Documents
Culture Documents
Pe - Iv - Wireless and Mobile Networks
Pe - Iv - Wireless and Mobile Networks
UNIT-III (9Hrs)
Security of Ad Hoc Networks: Ad Hoc Networking, Major Routing Protocols in Ad Hoc Networks, Attacks against Ad
Hoc Networks, Securing Ad Hoc Networks, Authentication in Ad Hoc Networks, Key Management, Intrusion CO3
Detection in Ad Hoc Networks.
Inter-System Roaming and Internetworking Security: Introduction, Roaming, Roaming Authentication and Key
Agreement, Inter-Provider Roaming within the GSM and UMTS, Man-in-the-Middle Attack on UMTS, Inter-Provider
Handover, The Security Solutions, Attacks against Inter-Provider Handover.
UNIT- IV (9Hrs)
Securing Mobile Services: Basics on E-Services, M-Services Discovery, Basic Examples of M-Services and Challenges,
M-Government, M-Commerce, M- Service Message Protection Mechanisms, Securing Registry for M-Services
Security of Satellite Services: Examples of Satellite Networks, Reliable Transport in Mobile Satellite CO4
Communications, Packet Routing in Non-GEO Networks, Mobility and Location Management in Satellite Networks,
Attacks against Satellite Networks, Securing Satellite Networks
UNIT- V (9Hrs)
Security of Mobile Voice Communications: Introduction, Basics on VoIP, Security Issues in VoIP, Mobility Issues,
The Security Threats to Mobile VoIP, Attacks on the Key Exchange, Secure Real-Time Protocol, Securing Mobile
VoIP.
Security of Multimedia Communications: Introduction, Transmission Issues of Mobile Multimedia, Securing CO5
Copyright in Mobile Networks, Major Watermarking Techniques, Attacks against Mobile Multimedia,
Countermeasures against Watermarking Attacks, Security of Mobile Multimedia Multicasting Schemes.
Text Books
1. Noureddine Boudriga, “Security of Mobile Communications”, First Edition, CRC Press, 2010.
2. Himanshu Dwivedi, Chris Clark, David Thiel, “Mobile Application Security”, McGraw Hill, 2010.
Reference Books
1. Himanshu Dwivedi, Chris Clark, David Thiel, “Mobile Application Security”, McGraw Hill, 2010.
2. Iosif I. Androulidakis, “Mobile Phone Security and Forensics: A Practical Approach”, Second Edition, Springer Publications, 2012.
3. Andrew Hoog, “Android Forensics: Investigation, Analysis and Mobile Security for Google Android”, Elsevier Publications, 2011.
Web References
1. https://www.cisco.com/c/en/us/solutions/small-business/resource-center/security/mobile-device-security.html
COs/POs/PSOs Mapping
Program Specific
Program Outcomes (POs)
COs Outcomes (PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
1
2
3
4
5
Evaluation Method
* Application oriented / Problem solving / Design / Analytical in content beyond the syllabus