CHRISTIANCARMINE ESPOSITO | IOT SECURITY
CHRISTIANCARMINE ESPOSITO IOT SECURITY
cod. 0522500140
IOT SECURITY
0522500140 | |
COMPUTER SCIENCE | |
EQF7 | |
COMPUTER SCIENCE | |
2023/2024 |
YEAR OF COURSE 1 | |
YEAR OF DIDACTIC SYSTEM 2016 | |
AUTUMN SEMESTER |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 9 | 45 | LESSONS |
Objectives | |
---|---|
THE AIM OF THE COURSE IS TO INTRODUCE THE STUDENTS TO ALL THE ASPECTS OF IOT APPLICATIONS, FROM HARDWARE PLATFORMS AND OPERATING SYSTEMS TO COMMUNICATION PROTOCOLS AND CLOUD SOLUTIONS, AND TO PRESENT THE POSSIBLE VULNERABILITIES AND ATTACKS CHARACTERIZING EACH LAYER OF IOT ARCHITECTURES (FROM PHYSICAL ATTACKS TO COMMUNICATION ANOMALIES AND SOFTWARE CRITICALITIES), DESCRIBING THE SET OF EXISTING SOLUTIONS TO GUARANTEE SECURITY. KNOWLEDGE AND UNDERSTANDING THE STUDENT IS EXPECTED TO GAIN KNOWLEDGE ABOUT • THEORIES, PRINCIPLES AND TECHNIQUES OF SECURITY AND PRIVACY PARTICULARLY APPROPRIATE FOR THE IOT DOMAIN • TECHNIQUES OF EVALUATION AND ANALYSIS OF THE POSSIBILITIES OF VULNERABILITY •APPLICATION OF THE GDPR TO THE SECURITY CONTEXT IN THE IOT DOMAIN. ABILITY TO APPLY KNOWLEDGE AND UNDERSTANDING AT THE END OF THE COURSE, STUDENTS WILL BE ABLE TO • APPLY IOT SECUIRTY CONCEPTS AND THEORIES TO DESIGN AND IMPLEMENT IOT SYSTEMS IN SECURITY • DESIGN AND DEVELOP SERVICES THAT EXPLOIT THE BLOCKCHAIN OR OTHER ADVANCED SOLUTIONS FOR SECURITY IN THE IOT DOMAIN • APPLY TECHNIQUES FOR ANALYZING THE VULNERABILITY OF AN IOT SOLUTION |
Prerequisites | |
---|---|
COMPUTER NETWORKS, DISTRIBUTED SYSTEMS, CYBERSECURITY, CRYPTOGRAPHY, OPERATING SYSTEMS, COMPUTER PROGRAMMING |
Contents | |
---|---|
INTRODUCTION TO IOT (12 HOURS): ANATOMY AND TAXONOMY OF SENSORS; TYPES OF BOARDS AND THEIR INTERNALS & ARCHITECTURAL STACK; SENSOR HARDWARE: THE HARDWARE PLATFORMS; SOFTWARE ABSTRACTIONS FOR SENSORS: OPERATING SYSTEMS; PROGRAMMING LANGUAGES; MIDDLEWARE AND COMMUNICATION SOLUTIONS; CLOUD SUPPORT; SIMULATION. IOT SECURITY (12 HOURS): INTRODUCTION TO THE KEY PROPERTIES FOR SECURITY AND PRIVACY IN IOT, SURVEY OF IOT VULNERABILITIES AND ATTACKS, AND MAIN COUNTERMEASURES AT THE HARDWARE, NETWORK AND TRANSPORT LEVEL. ADVANCED SERVICES (12 HOURS): CLOUD SECURITY, EXPLOITATION OF BLOCKCHAIN FOR SECURITY-RELATED SERVICES IN THE IOT, LIGHTWEIGHT CRYPTOGRAPHY, IOT AUTHENTICATION AND AUTHORIZATION, LIGHTWEIGHT KEY MANAGEMENT. LABORATORIO DI IOT SECUIRTY (9 ORE): PROGRAMMAZIONE ARDUINO IN SICUREZZA E APPLICAZIONE DELLE TENICHE STUDIATE. |
Teaching Methods | |
---|---|
CLASSROOM LECTURES WITH PRACTICAL EXAMPLES TO BE DEVELOPED TOGETHER WITH THE STUDENTS. |
Verification of learning | |
---|---|
PRACTICAL EXAM CONSISTING IN THE DEVELOPMENT OF A SIMPLE IOT APPLICATION TO VERIFY THE CONCRETE ABILITY TO WRITE APPS WITH SECURITY MEANS TO PROVIDE A SUITABLE DEGREE OF PROTECTION AT THE SENSOR, CLOUD AND COMMUNICATION LEVELS, ORAL EXAM WITH A SERIES OF QUESTIONS CONCERNING BOTH GENERAL KNOWLEDGE AND SPECIFIC TECHNICAL PROBLEMS TO VERIFY THE STUDENT'S KNOWLEDGE ON SECURITY ISSUES AND SOLUTIONS APPLIED TO THE CONTEXT OF IOT APPLICATIONS AND PLATFORMS. |
Texts | |
---|---|
THERE IS NO TEXTBOOK. REFERENCES AND LEARNING MATERIAL WILL BE PROVIDED. |
More Information | |
---|---|
HTTP://ELEARNING.INFORMATICA.UNISA.IT/EL-PLATFORM/LOGIN/INDEX.PHP |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2024-11-05]