Course Details

Course Code COMP9337
Course Title Securing Fixed and Wireless Networks
Convenor Sanjay Jha
Admin Uzma Maroof
Classes Lectures :
Tuesday 16:00 - 18:00 Week1-10 CLB5
Friday 12:00 - 14:00 Week1-10 CLB5
Timetable for all classes
Consultations LIC: K-17 501L (please seek prior appointment by sending email to
Labs/Assignments/Admin: TBA
Units of Credit 6
Course Website
Handbook Entry

Course Summary

To provide an in-depth introduction to a wide range of topics in the field of Wireless Network Security. To get a hands-on understanding of the security issues in wireless networks. Assumed Knowledge

Before commencing this course, students should:

  • have completed COMP3331/9331<o:p></o:p>
  • have programming skills acquired in other subjects.

Student Learning Outcomes

After completing this course:

  • Students will have a sound knowledge of the state-of-the-art advances in network security, with an emphasis on the next generation Internet architectures and protocols. They will be able to demonstrate their knowledge both by describing aspects of the topics, and by solving problems related to the topics.
  • Students will also be equipped with the necessary skills to conduct security analysis of fixed and wireless networks.
  • A wide range of assessment components ranging from lab exercises, lab reports, oral presentation, research project will be used to measure these outcomes. This is explained in greater details in the description of the individual assessment tasks.
  • By completing the laboratory exercises and reports, the students will develop the following UNSW graduate attributes:(i) the ability to engage in independent and reflective learning because they will need to use the concepts learned in the lectures to design their program specifications individually and (ii) information literacy skills to appropriately locate, evaluate and use relevant information because they will need to use the programming skills and basic networking concepts previously acquired in earlier subjects.
  • This course contributes to the development of the following graduate capabilities:

    Graduate Capability Acquired in
    Scholars capable of independent and collaborative enquiry, rigorous in their analysis, critique and reflection, and able to innovate by applying their knowledge and skills to the solution of novel as well as routine real world problems,
    the project have been specifically designed so that students can gain the required analytical skills for solving real world problems
    Entrepreneurial leaders capable of initiating and embracing innovation and change, as well as engaging and enabling others to contribute to change the students will have to work in a group to accomplish their goals, guest lectures from industry
    Professionals capable of ethical, self- directed practice and independent life long learning Labs, assignment, in-class interactions
    Global citizens who are culturally adept and capable of respecting diversity and acting in a socially just and responsible way interaction with your fellow students

    Teaching Strategies

    The main objective of this course is to encourage students to be creative and being able to think outside the box. Students should be able to relate new ideas to previous knowledge or real world experience. The student experience will consist of lectures (3-4 hrs per week) for the first 7-8 weeks. A set of review/quiz questions is provided to help reinforce the main ideas introduced during the lecture (There are no formal tutorials in this course). At least some part of assessment should be based on real world experiences. COMP4337/9337 uses of hands on laboratory sessions aimed at supporting problem based learning to enhance student-learning experience. The student experience will be supported by on-line access to materials. Finally, students will be required to complete a project by either writing programs, analysing security vulnerabilities propose solution or a research report (Details TBA) .

    Teaching Rationale

    This course is an elective and focussed on acquiring basic theoretical network security skills as well as hands-on skills that will prepare students for the cybersecurity industry as well as R&D oriented jobs.

    Student Conduct

    The Student Code of Conduct ( Information , Policy ) sets out what the University expects from students as members of the UNSW community. As well as the learning, teaching and research environment, the University aims to provide an environment that enables students to achieve their full potential and to provide an experience consistent with the University's values and guiding principles. A condition of enrolment is that students inform themselves of the University's rules and policies affecting them, and conduct themselves accordingly.

    In particular, students have the responsibility to observe standards of equity and respect in dealing with every member of the University community. This applies to all activities on UNSW premises and all external activities related to study and research. This includes behaviour in person as well as behaviour on social media, for example Facebook groups set up for the purpose of discussing UNSW courses or course work. Behaviour that is considered in breach of the Student Code Policy as discriminatory, sexually inappropriate, bullying, harassing, invading another's privacy or causing any person to fear for their personal safety is serious misconduct and can lead to severe penalties, including suspension or exclusion from UNSW.

    If you have any concerns, you may raise them with your lecturer, or approach the School Ethics Officer , Grievance Officer , or one of the student representatives.

    Plagiarism is defined as using the words or ideas of others and presenting them as your own. UNSW and CSE treat plagiarism as academic misconduct, which means that it carries penalties as severe as being excluded from further study at UNSW. There are several on-line sources to help you understand what plagiarism is and how it is dealt with at UNSW:

    Make sure that you read and understand these. Ignorance is not accepted as an excuse for plagiarism. In particular, you are also responsible that your assignment files are not accessible by anyone but you by setting the correct permissions in your CSE directory and code repository, if using. Note also that plagiarism includes paying or asking another person to do a piece of work for you and then submitting it as your own work.

    UNSW has an ongoing commitment to fostering a culture of learning informed by academic integrity. All UNSW staff and students have a responsibility to adhere to this principle of academic integrity. Plagiarism undermines academic integrity and is not tolerated at UNSW. Plagiarism at UNSW is defined as using the words or ideas of others and passing them off as your own.

    If you haven't done so yet, please take the time to read the full text of

    The pages below describe the policies and procedures in more detail:

    You should also read the following page which describes your rights and responsibilities in the CSE context:

    Communications via E-Mail:

    (1) All students MUST read 'Notices' from the course web-site for any updates or notices regularly. Students must also check their unsw (or redirected) e- mail regularly for announcements regarding this course. Please note that we are using WebCMS for course delivery and improved learning. Students must checkWebCMS regularly. Missing a notification is not a valid excuse at any point.

    (2) Students must follow the proper communication channels. These are clearly specified on WebCMS.

    Note: Do not send direct emails to LIC, Administrator, etc. via their personal email addresses. Emails received at private accounts will not be read and automatically deleted without reply. All communications must occur through Moodle.

    Special Considerations / Supplementary Examination

    All students with approved letter from UNSW Disability Support must upload their letters through the designated link on Moodle. Students should not use email for such requests. The Course Admin will reply to the student letter issued from Disability Support and will apply any requirement specified in the letter throughout the semester.

    For any unexpected incident that the student requires Special Consideration (e.g. illness affecting reaching a deadline, or missing a Quiz), the student must submit a Special Consideration request through the designated link on Moodle. In fact, as per the university policy, all Special Consideration requests have to be submitted through the central system. Hence, please refer to the designated link on Moodle and follow the instructions. Your LIC will decide as per documents you provide there. Email requests about special consideration sent to course admin and LIC will not be attended to.

    The following cases may be considered:

    (1) A student has submitted a fully documented request for Special Consideration within 3 days of the assignments or examination. The medical or other evidence is clearly of a nature to affect the student's performance seriously (minor ailments such as cold, headache - unless chronic, or severe enough to require prescribed medication, will not be considered). Feeling 'unwell', for instance does not excuse a poor result. In simple terms, not all applications are automatically accepted.

    (2) A student's performance during the semester, particularly in the lab and research reports has been of satisfactory standard. Students who perform poorly in such assessment components will not be granted a supplementary exam.

    (3) A supplementary assessment will be arranged at a suitable time by the school/lecturer-in-charge.

    If you miss a quiz, we will not be able to organise a supplementary. We will offer scaling up your final exam grades subject to meeting the special consideration policy.

    Re-Assessment Policy: The University has a policy for review of results that allows students who believe there has been an error in the calculation of their final mark to appeal that mark. There currently may be a fee attached to applying for a re-mark which is refunded only if the mark changes substantially upwards. UNSW Student Central will advise of the current policy on applying this fee. There is also a 15 working day time limit in applying for a review of marks. See:

    Students are able to apply for an "administrative check" that all sections of their final exam have been marked, and all marks and assessment task marks have been correctly entered into the calculation of the final mark. The fee for this is nominal.

    Students may also apply for a "re-assessment" or "re-mark" of a piece of work. The fee for this is substantial. The re-mark is done using the same marking scheme as was used originally. Normally this will be done by a person other than the original marker. If the re-marker feels that an error in marking has been made then they will consult with the original marker where relevant as to the correct interpretation of the mark scheme.

    A re-mark may result in the allocated mark increasing, staying the same or decreasing.

    Students should note that it is rare in a large class for there to be a change in the mark following a re-mark. Before applying for a re-mark the student should have consulted with the Course Convenor on their performance in the course.


    Item Topics Due Marks Contributes to
    Quizzes All topics TBA 20% 1,2,...
    Assignment Security Analysis/Research Report TBA 20% 1,...
    All topics 5 Labs, Weeks TBA 20% 1,2,...
    Final Exam
    All topics
    Exam period

    Note: A double pass is applicable to this course where students must achieve 40% in the final exam to pass this subject. LIC reserves right to apply harmonic mean between final exam and other components. Also, scaling can be applied to any component. If scaling upwards is applied to final examination, no further consideration for double pass will be entertained for border line course. Failure based on double pass will not quality for a supplementary examination.

    Course Schedule

    Week Lectures Tutes Labs Assignments Quizzes Notes

    Course Overview, Security in IP protocol stack Network Security, Crypto intro

    No No - - -

    Wireless LAN, Stream Ciphers, symmetric key ciphers

    No lab1-crypto - - -
    3 Authentication, Key distribution/Kerberso, PGP, SSL, TLS, PKI No something - -

    Network Layer Security, IPSec

    No Lab2-Wireless Net


    Authentication and Authorisation in WLAN, 801.X EAP

    No Lab3 -MiTM, Evil Twin Ass. release Quiz 1
    6 Mid-term break - -
    - -

    Intrusion Detection/Prevention System, Guest Lecture

    No Lab4- Sec Analysis Wireshark - -

    Introduction to BluetoothSecurityBroadcast Authentication, MerkleTree

    IoT Security

    No lab-5 Snort IDS
    - -
    Privacy Preserving techniques, Blockchain Security
    No something
    Quiz 2 -
    10 Guest Lecture
    Project work/demo/submission
    No something Ass. due
    - -
    11 Revision No something - - -

    * Due dates tentative please check notice/specs - - -

    * Lecture order may change, new topics via guest lecture

    Texts and recommended readings:

    This course does not have a prescribed textbook. Most of the content presented will multiple books, on-line materials, conference proceedings, journal articles, etc. A list of references related to each week's lecture content will be made available on the course webpage.

    Students are expected to read articles/papers as directed. Lecture notes will have reference to appropriate sections (and other material)

    Reference Texts:

    The following is a list of reference textbooks, which may be useful. Students are not required to purchase these.

    • William Stallings, Cryptography and Network Security, Sixth Edition
    • Security in Fixed and Wireless Networks: Guenter Schaefer, Michael Rossberg, Wiley, 2nd Edition, 2016
    • CWSP – Certified Wireless Security Professional Official Study Guide
    • R. Nichols and P. C. Lekkas, Wireless Security: Models, Threats and Solutions., McGraw-Hill Telecom, 2006
    • M. Spincer, R. Perlman and C. Kaufman, Nework Security” Private Communicaton in a Public Worked, Pearson Ed, 2002
    • L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks

    Other resources

    Students will find the following Network Security Knowledge Area (and other KAs from this site) useful for this subject and other security topics:

    Course Evaluation and Development

    Student feedback on this course, and on the lecturing in this course, will be gathered via myExperience portal. Student feedback is taken seriously, and continual improvements are made to the course based in part on this feedback. The course questionnaire results go to the Head of the School of Computer Science and Engineering, who reads the results and follows up in cases where action is clearly needed

    In addition feedback will also be gathered mid-way through the session to gauge the student experience and make any quick changes if required to improve student learning.

    The course had highly positive feedback in 2019. There have been requests for improved in-class interactions. This is a two-way process; we will brainstorm some ideas on this at the start of lecture. Lab and project specification and submission requirements will be improved to make them more effective.

    Resource created Sunday 02 February 2020, 08:46:23 PM, last modified Monday 10 February 2020, 06:13:02 PM.

    Back to top

    COMP4337/COMP9337 20T1 (Securing Fixed and Wireless Networks) is powered by WebCMS3
    CRICOS Provider No. 00098G