Resilience of Mobile Applications (3 ECTS)

Security and privacy protection are strong requirements for the widespread deployment of wireless technologies for commercial applications. It is particularly true for mobile computing devices (PDAs, smartphones, ...) with focus on multimedia applications. Also, due to the nature of wireless media, dynamic network topology, resource constraints, and lack of any base station or access point, security in ad-hoc networks is more challenging than with cabled networks, justifying the study of secure protocols used for this purpose. By combining computing and communications with the surrounding physical environment through information collection using various sensors, pervasive computing eases their transparent use in day-to-day activities. The inherent disadvantages of slow, expensive connections, frequent line disconnections, limited host bandwidth, and location dependent data make pervasive computing more vulnerable to various security-related threads: requirements and deployment techniques for this type of computing form the last topic covered by this course.


Suggested readings:

L. Buttyan, and J.-P. Hubaux: Security and cooperation in wireless networks, Cambridge University Press, 2007 – the corresponding slides can be found at

K. N. De Randall, C. L. Panos (Eds.): Wireless Security: Models, Threats, and Solutions, McGraw-Hill Professional, 2002

G. Karmakar, and L. S. Dooley (Eds.): Mobile Multimedia Communications: Concepts, Applications and Challenges, Idea Group Inc, 2007

Courseware examples and locations where taught:

Line of teaching

View this course in the RKBExplorer

Back to MSc Curriculum.