Skip to main content
Skip header

Selected Issues of Communications Security

* Exchange students do not have to consider this information when selecting suitable courses for an exchange stay.

Course Unit Code440-4123/01
Number of ECTS Credits Allocated4 ECTS credits
Type of Course Unit *Compulsory
Level of Course Unit *Second Cycle
Year of Study *First Year
Semester when the Course Unit is deliveredSummer Semester
Mode of DeliveryFace-to-face
Language of InstructionCzech
Prerequisites and Co-Requisites Course succeeds to compulsory courses of previous semester
Name of Lecturer(s)Personal IDName
VOZ29prof. Ing. Miroslav Vozňák, Ph.D.
ROZ132Ing. Jan Rozhon, Ph.D.
REZ106Ing. Filip Řezáč, Ph.D.
TOM551Ing. Martin Tomis, Ph.D.
SAF077Ing. Jakub Šafařík, Ph.D.
PAR0038Ing. Pavol Partila, Ph.D.
The subject focuses on the selected hot issues of communications security. First half of the course is dedicated to the security of wireless and mobile networks. In the second part, students familiarize themselves with optical fiber sensors for security purposes, the quantum cryptography, NetFlow analysis and honeypots/honeynets. Selectes issues come more or less from outcomes of research projects solved by VŠB-TUO.
Learning Outcomes of the Course Unit
The aim of the subject is to familiarize the students with theoretical and especially practical aspects of communications security. After the subject completion students will be able to orient especially in the security of wireless networks and other domains such as the quantum cryptography, Netflow analysis or honeypots/honeynets.
Course Contents
1. The introduction to communications security concerns, technology overview, the relation to other subjects and topics.
2. Wireless networks vulnerabilities, CUDA-base WiFi network penetration tests.
3. Security concerns of wireless sensor networks, message delivery blocking, message faking and eavesdropping, sensor manipulation.
4. Mobile networks vulnerabilities, active GSM network jamming, UMTS and LTE jamming resilience, base station faking and scanning, IMSI and content sniffing.
5. Eavesdropping in the mobile networks and its detection, encryption profiles in various technologies, known security weaknesses of GSM (A5 cipher), location and traffic data mining.
6. Principles of transmitter location in the radio networks, beacon-based in-building location and orientation, possible ways for mobile network device location, movement monitoring and practical implementation.
7. An invited lecture on practical communication security incidents.
8. Interferometry, Raman, Brillouin and Rayleigh dispersion and their usage in optical fiber detectors.
9. Principles of key distribution using quantum mechanics (QKD), QKD protocols - BB84, SARG04 and E91, QKD in quantum networks.
10. Network traffic analysis tools - IOS Diagnostic Tools, Packet Capturing, SNMP and Netflow. Traffic analysis based on signatures, advanced behavioral analysis of Netflow data.
11. VoIP security concerns, eavesdropping, content modification, DoS, deliberate service termination and quality degradation. Recommended measures.
12. Honeypots and Honeynets. Design of VoIP Honeypot.
13. Authentication, multifactor authentication, single-sign-on systems and authorization system design based on OpenAuth.
14. Emerging technologies and discussions on future security trends.
Recommended or Required Reading
Required Reading:
[1] CHAOUCHI, H., LAURENT-MACKANIVICIUS, M. Wireless and Mobile Network Security, Wiley; 1 edition, 744 pages, 2009.
[1] ŘEZÁČ, F. VOZŇÁK, M., ROZHON, J. Bezpečnost v komunikacích, VŠB-TUO: 2. rozšířené vydání,185 str., 2013.
[2] BRÍDA, P., DOBOŠ, L., MACHAJ, J., PAPAJ, J. Lokalizácia mobilních objektov prostřednictvím rádiových sietí, ŽU, 1. vydání, 186 str., 2015.
[3] CHAOUCHI, H., LAURENT-MACKANIVICIUS, M. Wireless and Mobile Network Security, Wiley; 1 edition, 744 pages, 2009.
Recommended Reading:
[1] SPITZNER, L. Honeypots: tracking hackers. Addison-Wesley, 2003.
[1] SPITZNER, L. Honeypots: tracking hackers. Addison-Wesley, 2003.
[2] LEVICKÝ, D. Kryptografia v informačnej bezpečnosti. TUKE: Elfa, 277 s. 2010.
Planned learning activities and teaching methods
Lectures, Seminars
Assesment methods and criteria
Task TitleTask TypeMaximum Number of Points
(Act. for Subtasks)
Minimum Number of Points for Task Passing
Credit and ExaminationCredit and Examination100 (100)51
        CreditCredit40 15
        ExaminationExamination60 20