Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

INTERNET OF THINGS SECURITY

21CS2012
Course Objectives:

Students enabled to:


1. understand the architectural overview of IoT security.
2. infer the cryptographic fundamentals for IoT
3. apply the secure design principles for IoT devices
Course Outcomes:

Students enabled to:


1.demonstrate knowledge and understanding of the security in internet of things
2.describe cryptographic primitives involved for securing IoT
3.conceptually identify vulnerabilities, including recent attacks in securing the
internet of things
4.analyse the Identity and Access Management Solutions for IoT
5.appraise the security challenges related to emerging technologies
6.design security solutions for IoT applications
Module 1: Introduction to IoT
• Defining IoT: Understand what IoT is and its basic components.
• IoT Uses Today: Learn about the current applications of IoT in various industries.
• The IoT in the Enterprise: Explore how IoT is used within business environments.
• IoT of the Future and the Need to Secure: Discuss future trends in IoT and the
importance of securing these systems.
• IoT Security Vulnerabilities, Attacks, and Countermeasures: Identify common
security issues and how to mitigate them.
• Security Engineering for IoT Development: Learn the principles of designing
secure IoT systems.
• IoT Security Lifecycle: Understand the stages involved in securing IoT from
development to deployment and maintenance.
Module 2: Cryptographic Fundamentals for
IoT
• Role of Cryptography in IoT: Learn why cryptography is essential for IoT security.
• Cryptographic Module Principles: Study the basic principles behind
cryptographic modules used in IoT.
• Key Management Fundamentals: Understand how to manage cryptographic
keys securely.
• Cryptographic Controls in IoT Messaging and Communication Protocols:
Explore how cryptographic controls are integrated into IoT protocols.
• Identity and Access Management for IoT: Learn how to manage identities and
access in IoT systems.
• Mitigating IoT Privacy Concerns: Study strategies to protect user privacy in IoT
environments.
Module 3: Securing the Internet of Things
• Security Architecture in IoT: Understand the overall architecture for securing IoT systems.
• Threats to Access Control, Privacy, and Availability: Identify common threats to IoT
systems.
• Attacks Specific to IoT: Learn about unique attacks targeting IoT devices and systems.
• Vulnerabilities: Understand different vulnerabilities present in IoT systems.
• Secrecy and Secret-Key Capacity: Study the concepts of data secrecy and secret-key
capacities.
• Authentication/Authorization for Smart Devices: Learn methods for authenticating and
authorizing IoT devices.
• Transport Encryption: Explore encryption techniques for securing data during
transmission.
• Attack & Fault Trees: Use attack and fault trees to analyze potential security issues.
Module 4: Identity and Access Management
Solutions for IoT
• Identity Lifecycle: Study the lifecycle of identities in IoT systems.
• Authentication Credentials: Learn about various authentication methods and credentials used in IoT.
• IoT IAM Infrastructure: Understand the infrastructure needed for identity and access management in
IoT.
• Authorization with Publish/Subscribe Schemes: Explore authorization techniques using
publish/subscribe models.
• Access Control: Learn about different access control mechanisms for IoT.
• Privacy Preservation and Trust Models for IoT: Study models for preserving privacy and establishing
trust in IoT systems.
• Concerns in Data Dissemination: Address issues related to the dissemination of data in IoT.
• Lightweight and Robust Privacy Protection Schemes: Explore efficient methods for protecting privacy
in IoT.
• Trust and Trust Models for IoT: Understand how trust is established and maintained in IoT networks.
• Preventing Unauthorized Access: Learn techniques to prevent unauthorized access to IoT systems.
Module 5: Cloud Security and IoT
• Cloud Services and IoT: Explore the relationship between cloud
services and IoT.
• Offerings Related to IoT from Cloud Service Providers: Learn about
cloud-based solutions and services for IoT.
• Cloud IoT Security Controls: Study security controls specific to cloud-
enabled IoT environments.
• Enterprise IoT Cloud Security Architecture: Understand the
architecture of secure IoT solutions using cloud services.
• New Directions in Cloud-Enabled IoT Computing: Explore emerging
trends and directions in cloud-enabled IoT computing.
Module 6: IoT Security Modeling and Design
Analysis
• Securing Smart Cities: Implications and Challenges: Understand the
security challenges specific to smart city implementations.
• Anomaly Behavior Analysis of IoT Protocols: Learn to analyze and
detect anomalous behavior in IoT protocols.
• Proactive Defense Against Security Threats on IoT Hardware: Study
proactive defense mechanisms to protect IoT hardware.
• Decentralized Access Control for IoT Based on Blockchain and Smart
Contract: Explore the use of blockchain and smart contracts for
decentralized access control in IoT systems.

You might also like