Information on individual educational components (ECTS-Course descriptions) per semester

  
Degree programme:Master Computer Science
Type of degree:FH MasterĀ“s Degree Programme
 Full-time
 Summer Semester 2024
  

Course unit titleArchitectures and Security in Distributed Systems
Course unit code024913020406
Language of instructionEnglish
Type of course unit (compulsory, optional)Elective
Semester when the course unit is deliveredSummer Semester 2024
Teaching hours per week2
Year of study2024
Level of course unit (e.g. first, second or third cycle)Second Cycle (Master)
Number of ECTS credits allocated3
Name of lecturer(s)Armin SIMMA


Prerequisites and co-requisites

Knowledge of computer networks.

Basic knowledge of cryptology and security goals.

Basic knowledge of operating systems including handling the Linux command line; Basic knowledge of Linux and Windows command line commands. Basic ability to write a Linux script.

Basic programming knowledge (C, Java) and the ability to learn another programming language (at least the basics) yourself (e.g. Python, Perl)

Course content

The starting point are architectures for IoT systems, which consist of small and micro devices, active and passive communication infrastructure and a complex server landscape in the background system

  • Cloud computing, edge computing, fog computing
  • Message-based, stream-oriented, etc. architectures (e.g. MQTT, Apache Kafka), practical application
  • Communication strategies (publish / subscribe, client / server, ...) and quality of service
  • Transfer protocols for networking: CoAP, REST, Web Sockets
  • Always On Architectures: Partial / Incidental On
  • Effects of the architectures on resources (power, throughput, costs, ...) and vice versa

Security:

The following content relates to IoT / distributed systems, even if not explicitly stated.

  • IoT security architectures
  • Specific security challenges / goals / requirements for IoT / distributed systems
  • Specific threats to IoT / distributed systems
  • Best practices for IoT security
  • Norms and standards
  • Cryptology and cryptological applications in the field of IoT / distributed systems
  • Trust and Trusted Computing (TPM); Trusted Execution Environments TEE; Secure elements;
  • Secure Boot
  • Clear and secure proof of identity for products, processes and machines
  • Key management in the field of IoT (including hardware-based solutions)
  • Micro-segmentation
Learning outcomes

The students

  • know current design patterns for software architectures of distributed systems
  • can make a well-founded selection for their use
  • know current threats and consider the security goals in the draft
  • can implement the design patterns with the appropriate frameworks
  • can implement countermeasures against current threats in practice
  • know best practices in the field of IoT / distributed systems and can implement them
Planned learning activities and teaching methods

Lecture with exercises on the individual architectures; Lecture and case study on safety in teams of two.

Assessment methods and criteria

Evaluation of the exercises 10%

Writen exam 90%

For a positive grade, a minimum of 50% of the possible points must be achieved in each part of the examination.

Comment

None

Recommended or required reading
  • Butun, Ismail (2020): Industrial IoT: Challenges, Design Principles, Applications, and Security. 1st ed. 2020 edition. Cham: Springer.
  • Pal, Shantanu et al. (2020): ‘Security Requirements for the Internet of Things: A Systematic Approach.’ In: Sensors, 20 (2020), 20. Available at: https://doi.org/10.3390/s20205897
Mode of delivery (face-to-face, distance learning)

Face-to-face event with selected online elements

Summer Semester 2024go Top