Information on individual educational components (ECTS-Course descriptions) per semester

  
Degree programme:Master Computer Science
Type of degree:FH Master“s Degree Programme
 Full-time
 Summer Semester 2025
  

Course unit titleArchitectures and Security in Distributed Systems
Course unit code024913120406
Language of instructionEnglish
Type of course unit (compulsory, optional)Elective
Semester when the course unit is deliveredSummer Semester 2025
Teaching hours per week2
Year of study2025
Level of course unit (e.g. first, second or third cycle)Second Cycle (Master)
Number of ECTS credits allocated4
Name of lecturer(s)Markus SEEBERGER
Armin SIMMA


Prerequisites and co-requisites

Knowledge of computer networks.
Basic knowledge of cryptology and security goals.
Basic knowledge of operating systems including handling the Linux command line; Basic knowledge of Linux and Windows command line commands. Basic ability to write a Linux script.
Basic programming knowledge (C, Java) and the ability to learn another programming language (at least the basics) yourself (e.g. Python, Perl)


Course content

The following content relates to IoT / distributed systems, even if not explicitly stated.

  • Specific security challenges / goals / requirements for IoT / distributed systems
  • Specific threats to IoT / distributed systems
  • Best practices for IoT security
  • IoT security architectures
  • Norms and standards
  • Cryptology and cryptological applications in the field of IoT / distributed systems
  • Trust and Trusted Computing ; Trusted Execution Environments TEE; Secure elements;
  • Secure Boot
  • Clear and secure proof of identity for products, processes and machines
  • Key management in the field of IoT (including hardware-based solutions)
  • Practical labs with a Trusted Platform Module (TPM)
Learning outcomes

The students

  • know the difference between the security requirements of IoT versus IT systems
  • know current threats and consider the security goals of distributed and IoT systems
  • can implement countermeasures against current threats in practice
  • know best practices in the field of IoT / distributed systems and can implement them
  • know Trusted Computing technologies 
  • are able to implement basic scripts to work with a trusted platform modul
Planned learning activities and teaching methods

Lecture with labs: working with a simulated Trusted Platform Module

Assessment methods and criteria

Evaluation of the exercises 20%
Writen exam 80%

For a positive grade, a minimum of 50% of the possible points must be achieved in each part of the examination.

Comment

None

Recommended or required reading
  • Pal, Shantanu et al. (2020): ‘Security Requirements for the Internet of Things: A Systematic Approach.’ In: Sensors, 20 (2020), 20. Available at: https://doi.org/10.3390/s20205897
  • Koen Tange et al: "A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities", 2020, IEEE
  • Will Arthur, David Challener: "A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security", 2015
Mode of delivery (face-to-face, distance learning)

Face-to-face event with selected online elements

Summer Semester 2025go Top