Het Patel Cybersecurity Engineering
CprE 5300 interactive project

Wireless Security Across the TCP/IP Stack

This explorer connects wireless attack scenarios to the layers they touch, the security properties they threaten, and the controls that actually help. The goal is not to show exploit steps. The goal is to make layered security reasoning easier to see.

TCP/IP framing Wi-Fi, LTE, and 5G examples Self-checks included
Learning frame

What this project is trying to teach

The course material presents the stack layer by layer. This page is designed to show how wireless threats and defenses spill across those boundaries in practice.

Objective 01

Identify the main layers involved

Each module highlights the primary and secondary layers touched by the scenario so the stack becomes a reasoning tool instead of a memorization chart.

Objective 02

See what is visible, protected, or disrupted

The details panel separates exposed metadata, payload risk, and service impact so students can compare confidentiality, integrity, and availability clearly.

Objective 03

Choose reasonable mitigations

The defenses listed are meant to stay practical and layered. Some protections help locally, while others must be added higher in the stack.

This project is educational and defensive in scope. It focuses on analysis, layer mapping, and mitigation reasoning. It does not provide exploit code, jamming tooling, or operational attack steps.
Interactive explorer

Browse the modules

Answer the checks as you move through the modules.

Glossary and notes

Quick reading guide

Why "cross-layer" matters

Many attacks begin in one layer and show their effects somewhere else. Understanding that chain helps you select controls more accurately.

What "control-plane" means here

Control-plane traffic is the signaling used to attach, authenticate, manage mobility, and coordinate service state. It is different from ordinary user application content.

Why link security is not always enough

Link-layer protections may secure local access to a network, but they do not replace end-to-end protections once traffic moves beyond that local segment.

How to read the layer stack on this page

Primary layers are where the scenario begins or where the key mechanism lives. Impacted layers show where the effects continue to matter.