Het Patel Cybersecurity Engineering
Cloudflare-hosted build in progress

Wireless security makes more sense when the stack moves together.

This site is evolving into an interactive teaching experience for CprE 5300: a clean, browser-based explorer that maps wireless attacks and defenses across the TCP/IP stack using guided case studies, visuals, and self-checks.

5 interactive modules Wi-Fi, LTE, and 5G Defensive and educational only
05 Core modules covering jamming, sniffing, rogue APs, control-plane privacy, and higher-layer defenses.
05 TCP/IP layers surfaced visually so students can see where attacks start and where effects actually land.
01 Single static site that can ship cleanly on your existing portfolio and still feel like a standalone product.
Project direction

Why this build works for the course

The class teaches layered concepts one chapter at a time. The project adds value by reconnecting those ideas through realistic wireless scenarios.

Cross-layer reasoning

Attacks are traced where they start and where they show up

Jamming is introduced as a physical problem, then tied to retries, packet loss, and application instability so the student sees the stack as a system.

Grounded mitigations

Defenses are matched to the layer that can really help

The explorer separates what the link layer can fix from what still needs TLS, VPNs, filtering, segmentation, or user trust decisions above it.

Teaching usability

The interface stays readable for students who know networking but not telecom depth

Short explanations, layer highlights, and embedded checks keep the content approachable without flattening the technical story too much.

Featured build

Wireless Security Across the TCP/IP Stack Explorer

The explorer is built as a direct extension of your portfolio: same host, same design language, but its own dedicated experience and route so it can be shared independently.

Current module set

  • Signal denial and jamming
  • Wireless sniffing and visibility
  • Rogue and fake access points
  • LTE and 5G control-plane exposure
  • User-plane protection and higher-layer defense

Built for the web you already own

No framework migration is required for this first version. The explorer is implemented as a polished static experience so it deploys simply through the repo already connected to your Cloudflare-hosted site.

Selected work

Research and engineering context

The new 5300 project sits alongside your existing wireless and security work instead of replacing it.

Wireless lab

LTE emulation and jamming analysis

Built a full LTE lab with srsRAN, validated throughput with iperf, and studied how targeted RF disruption changes network behavior.

srsRAN USRP B210 Detection
Research

5G cybersecurity manuscript

Lead co-author work focused on methodology, threat framing, and practical countermeasures for next-generation wireless systems.

5G Methodology Validation
Web engineering

Static sites with a security mindset

Comfortable building clean HTML, CSS, and JavaScript experiences that deploy simply, stay maintainable, and keep the attack surface small.

HTML CSS JavaScript
Next step

Use the explorer as the portfolio entry point for this course project

The Projects page now routes visitors directly into the 5300 build, and the project itself is isolated enough to keep growing without losing the professional tone of the main site.