PV285 IoT Security

Faculty of Informatics
Spring 2024
Extent and Intensity
2/2/0. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
Taught in person.
Teacher(s)
Bacem Mbarek, PhD (lecturer)
doc. Ing. Václav Oujezský, Ph.D. (lecturer)
prof. RNDr. Tomáš Pitner, Ph.D. (lecturer)
doc. Mgr. Karel Slavíček, Ph.D. (lecturer)
Radmila Čermáková (assistant)
Guaranteed by
doc. Mgr. Karel Slavíček, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 A318
  • Timetable of Seminar Groups:
PV285/01: Tue 12:00–13:50 S108, B. Mbarek, V. Oujezský, K. Slavíček
Prerequisites
PV284 Introduction to IoT || SOUHLAS
Basic knowledge of computer architecture and operating systems, OS Linux, ABC of programming in C/C++. Common knowledge of IoT architecture, MCUs, sensors, and communication busses and protocols. Completion of the course IoT Introduction is recommended.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 50 student(s).
Current registration and enrolment status: enrolled: 5/50, only registered: 0/50, only registered with preference (fields directly associated with the programme): 0/50
fields of study / plans the course is directly associated with
Course objectives
The goal is to give students an overview of: * HW and SW components used to the ensure security of IoT systems * security risks of IoT systems and their mitigation
Learning outcomes
After completion of the course, the student will be able to: * understand security risks of IoT systems * have an overview of HW components usable to the enforce security of (not only) IoT systems * identify and mitigate security risks in IoT systems
Syllabus
  • 1. Introduction, HW components overview, cryptography fundamentals 2. MCUs with cryptography acceleration 3. Dedicated chips for secure storage of PKI private keys, dedicated chips for cryptography algorithms computation 4. HW for user authentication and biometric sensors 5. Blockchain and smart contracting 6. RFID, NFC, barcode, and QR code 7. Tools for communication eavesdropping and analysis 8. Communication busses attack 9. Protocol suite for encrypting data communications 10. Biometric sensors and authentication HW attack 11. RSA key storage attack 12. Data sources and actuators attack
Teaching methods
lectures, lab exercises, student projects
Assessment methods
student projects evaluation, activity on lab exercises, discussion
Language of instruction
English
Further comments (probably available only in Czech)
Study Materials
The course is taught annually.
Teacher's information
References and material for self-study (overlaps with IoT Introduction course): ● https://modbus.org/docs/Modbus_Application_Protocol_V1_1b3.pdf ● John S. Rinaldi. 2015. Modbus: The Everyman's Guide to a protocol that has stayed relevant in automation for over 30 years, Createspace Independent Publishing Platform. ● Pfeiffer, O. and Ayre, A. and Keydel, C.: Embedded Networking with CAN and CANopen isbn 9780976511625, 2008, Copperhill Technologies Corporation ● Dominique Paret: Flexray and its Applications: Real Time Multiplexed Network, 2012, ISBN:9781119979562 DOI:10.1002/9781119964063 John Wiley & Sons, Ltd ● By René Beuchat, Florian Depraz, Sahand Kashani, Andrea Guerrieri: Fundamentals of System-on-Chip Design on Arm Cortex-M Microcontrollers ISBN 978-1-911531-33-3 ● https://developer.ibm.com/technologies/iot/tutorials/ ● Michael Margolis: Arduino Cookbook, 2nd Edition, 2011, O'Reilly Media, Inc., ISBN: 9781449313876
The course is also listed under the following terms Spring 2023.
  • Enrolment Statistics (recent)
  • Permalink: https://is.muni.cz/course/fi/spring2024/PV285