Day 1 – Software Defined and Cognitive Radio
- Software Defined Radio
- Radio Architectures
- Reconfigurable Embedded Processing
- Hardware/Software Architectures
- Signal Processing
- Protocol Processing
- Research Challenges: Latency, Scalability, Management
- Cognitive Radio
- Planning Algorithms
- Machine Learning
- Policy Radios
- Learning Radios
- Radio Parameter Optimization
- Spectrum Sensing
- Dynamic Spectrum Access
- Emerging Spectrum Policy
- TV Whitespace
- National Broadband Plan
- Role of Spectrum Sharing
Day 2 – Emerging Communications Technologies
- RF Channel Models
- Fading
- Mobility
- Link Budgets
- Orthogonal Frequency Division Multiplexing (OFDM)
- Time-Frequency Diversity
- Frequency-Domain Modulations
- OFDM Basics
- Multiple Access Protocols
- Performance Analysis
- Multiple Input Multiple Output (MIMO)
- Spatial Diversity
- Beamforming
- Spatial Multiplexing
- Space-Time Coding
Day 3 – Cellular/Broadband Standards and Protocols
- Cellular Technology History
- 1G AMPS
- 2G GSM/EDGE/IS-95
- 2G CDMA/1xRTT
- 3G Cellular Technologies
- 3GPP UMTS
- 3GPP HSPA/HSPA+
- 3GPP2 CDMA2000
- 3GPP2 EV-DO
- IEEE Broadband Standards
- IEEE 802.11 (WiFi)
- IEEE 802.16 (WiMAX)
- IEEE 802.22 (WRAN)
- 4G Cellular Technologies
- 3GPP Long Term Evolution (LTE)
- 3GPP LTE Advanced
- IEEE 802.16m (WiMAX2)
- 5G Technologies
- Femtocells
- Cognitive Radio
- Dynamic Spectrum Access
Day 4 – Wireless Networking Security
- IEEE 802.11 Security
- Wired Equivalency Protocol (WEP)
- Cryptographic and Protocol Attacks
- IEEE 802.11i (WPA/WPA2)
- Extensible Authentication Protocol (EAP)
- Cellular Network Security Architectures
- Subscriber Identity Modules (SIMs)
- Authentication and Roaming
- Authorization and Accounting
- Core Network Security
- Physical-Layer Security
- RF Jamming Threats
- Intelligent Jamming
- Network-Layer Jamming
- Next-Generation Electronic Warfare
Day 5 – Emerging Mobile Security
- Changing Threat Model
- Emergence of Smartphones
- Military Applications of Smartphone Technologies
- Threats against Smartphones
- Mobile Applications
- Handset Security Challenges
- Hardware Security
- Operating System and Kernel Security (Linux)
- Mobile Distribution Security (Android, iOS)
- Mobile Application Security
- Network Security Challenges
- Mobile Device Management (MDM)
- Provisioning and Accounting
- Hardened App Stores
- Evolving DoD Policies
- Management of MDM
- Mobile Virtual Network Operators (MVNOs)
- Hardened COTS/GOTS Handset Programs
- DoD and Federal Mobility Strategies
Course Wrap-up
- Course Recap and Q/A
- Evaluations