Prerequisites and co-requisites |
Knowledge of computer networks. Basic knowledge of cryptology and security goals. Basic knowledge of operating systems including handling the Linux command line; Basic knowledge of Linux and Windows command line commands. Basic ability to write a Linux script. Basic programming knowledge (C, Java) and the ability to learn another programming language (at least the basics) yourself (e.g. Python, Perl)
|
Course content |
The following content relates to IoT / distributed systems, even if not explicitly stated.
- Specific security challenges / goals / requirements for IoT / distributed systems
- Specific threats to IoT / distributed systems
- Best practices for IoT security
- IoT security architectures
- Norms and standards
- Cryptology and cryptological applications in the field of IoT / distributed systems
- Trust and Trusted Computing ; Trusted Execution Environments TEE; Secure elements;
- Secure Boot
- Clear and secure proof of identity for products, processes and machines
- Key management in the field of IoT (including hardware-based solutions)
- Practical labs with a Trusted Platform Module (TPM)
|
Learning outcomes |
The students
- know the difference between the security requirements of IoT versus IT systems
- know current threats and consider the security goals of distributed and IoT systems
- can implement countermeasures against current threats in practice
- know best practices in the field of IoT / distributed systems and can implement them
- know Trusted Computing technologies
- are able to implement basic scripts to work with a trusted platform modul
|
Planned learning activities and teaching methods |
Lecture with labs: working with a simulated Trusted Platform Module |
Assessment methods and criteria |
Evaluation of the exercises 20% Writen exam 80%
For a positive grade, a minimum of 50% of the possible points must be achieved in each part of the examination. |
Comment |
None |
Recommended or required reading |
- Pal, Shantanu et al. (2020): ‘Security Requirements for the Internet of Things: A Systematic Approach.’ In: Sensors, 20 (2020), 20. Available at: https://doi.org/10.3390/s20205897
- Koen Tange et al: "A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities", 2020, IEEE
- Will Arthur, David Challener: "A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security", 2015
|
Mode of delivery (face-to-face, distance learning) |
Face-to-face event with selected online elements |