Wireless networks and wireless communications technology have the potential to make universal Internet use a reality, which will clearly lead to global connectivity, roaming, and ubiquitous communications. Meanwhile, the risk of threats to security grows and the need for secure wireless networks becomes of paramount concern. In this course, students gain the skills to defend against attacks and maintain security within wireless networks. Also, they will understand weakness in existing networks and design and configure a cost-effective security solution.


Language: The class is taught in English.
Assistant: select one student to manage, handle and collect the assignments, projects, and Lab activities.
Final Examination: Written examination, (40%)
Coursework 1: 6 pages research paper (in a team of two students), (30%)
Coursework 2: Project and Presentation (individually), (30%)


  • Session 1: Ad-hoc routing and security, class hand-out
  • Session 2: Destination-Sequenced Distance Vector Protocol and cluster based networks
  • Session 3: Dynamic Source Routing Protocol; Ad Hoc On-Demand Distance-Vector Protocol
  • Session 4: Securing Ad Hoc Networks, Mitigating Routing Mis-behaviour in Mobile ad hoc networks
  • Session 5: Secure Routing for Mobile Ad hoc Networks, Using the Fluhrer, Mantin, and Shamir Attack to Break WEP, A Secure Routing Protocol for Ad Hoc Networks, Scalable Routing Strategies for Ad Hoc Wireless Networks
  • Session 6: Adaptive Security for Multi-layer Ad-hoc Networks, Intrusion detection in wireless ad-hoc networks, Self-certified keys -- Concepts and Applications
  • Session 7: Defining the Continuum of Trust, A Network-Centric Approach to Embedded Software for Tiny Devices., Active Message Communication for Tiny Network Sensors
  • Session 8: Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc, Performance Comparison of two on-demand routing protocols for ad hoc networks
  • Session 9: On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks, Overlay Networks, Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks, Security on the Move: Indirect Authentication using Kerberos
  • Session 10: Generating RSA Keys on a Handheld Using an Untrusted Server, Providing Robust and Ubiquitous Security Support for Mobil Ad Hoc Networks
  • Session 11: Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems, SEAD Secure Efficient Distance Vector Routing for Mobile Wireless Ad-Hoc networks, Self-securing ad-hoc wireless networks
  • Session 12: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, Course Review