You are on page 1of 1
or len lew wo 18CS3053 Internet of Things Security ‘Course Objectives: Enable the student to 1. understand the Security requirements in loT. 2. infer the cryptographic fundamentals for loT 3. apply the authentication credentials in Cloud Security. Course Outcomes: ‘The student will be able to: 1. demonstrate knowledge and understanding of the security and ethical issues of the internet of | things conceptually identify vulnerabilities, including recent attacks, involving the internet of things describe countermeasures for intemet of things devices and security threats analyze the societal impact of 1OT security events develop critical thinking skills ‘Module 1: Introduction to 1OT ‘An Architectural Overview~ Building an architecture, Main design principles and needed capabilities, An ToT architecture outline, standards considerations, M2M and IoT Technology Fundamentals- Devices and gateways, Local and wide area networking, Data management, Business processes in oT, Everything as a Service (XaaS), M2M and IoT Analytics, Knowledge Management, Module 2: Securing the Internet of Things Security Requirements in oT Architecture - Security in Enabling Technologies - Security Concer in IoT Applications. Security Architecture in the Intemet of Things - Security Requirements in IoT Insufficient Authentication’ Authorization, ‘Module 3: Insecure Access Control ‘Threats to Access Control, Privacy, and Availablity - Attacks Specific to ToT. Vulnerabilities ~ Secrecy sand Secret-Key Capacity ~ Authentication/Authorization for Smart Devices ~ Transport Encryption — Avtack & Fault trees Module 4- Cryptographic Fundamentals for 1OT Cryptographic primitives and its role in oT ~ Encryption and Decryption ~ Hashes ~ Digital Signatures ~ ‘Random number generation — Cipher suites — key management fundamentals ~ cryptographic controls ‘built into ToT messaging and communication protocols - IoT Node Authentication Module 5: Dentity and Access Management Solutions for 1OT THlentty lifecycle ~ authentication credentials — ToT TAM infiastructure — Authorization with Publish / Subscribe schemes — access control - privacy preservation and trust models for iot -Concems in data dissemination — Lightweight and robust schemes for Privacy protection ~ Trust and Trust models for oT — self-organizing Things - Preventing unauthorized access. Module 6: Cloud Security 1OT Cloud services and IoT - offerings related to ToT from cloud service providers — Cloud IoT security controls - An enterprise IoT cloud security architecture ~ New directions in cloud enabled IoT computing, Reference Books: 1. Vijay Madisetti and Arshdeep Bahga, “Internet of Things (A Hands-on Approach)”, 1* Edition, PT, 2014 2. Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Tamatis Kamouskos, David. Boyle, “From Machine-to-Machine to the Intemet of Things: Introduction to a New Age of Intelligence", 1* Edition, Academic Press, 2014 3. Brian Russell, Drew Van Duren, Practical Internet of Things Security, Packt Publishing, 2016 Computer Science and Engineering

You might also like