CHRISTIANCARMINE ESPOSITO | IOT SECURITY
CHRISTIANCARMINE ESPOSITO IOT SECURITY
cod. 0522500140
IOT SECURITY
0522500140 | |
COMPUTER SCIENCE | |
EQF7 | |
COMPUTER SCIENCE | |
2024/2025 |
YEAR OF COURSE 1 | |
YEAR OF DIDACTIC SYSTEM 2016 | |
AUTUMN SEMESTER |
SSD | CFU | HOURS | ACTIVITY | |
---|---|---|---|---|
INF/01 | 9 | 45 | LESSONS |
Objectives | |
---|---|
THE COURSE INTRODUCES THE FUNDAMENTAL ASPECTS OF IOT APPLICATIONS, FROM HARDWARE PLATFORMS AND OPERATING SYSTEMS TO COMMUNICATION PROTOCOLS AND CLOUD SOLUTIONS, AND PRESENTS THE POSSIBLE VULNERABILITIES AND ATTACKS THAT CHARACTERIZE EACH LAYER OF CURRENT IOT ARCHITECTURES (FROM PHYSICAL ATTACKS TO COMMUNICATION ANOMALIES AND CRITICALITY OF THE SOFTWARE), DESCRIBING THE SET OF EXISTING SOLUTIONS TO GUARANTEE ADEQUATE LEVELS OF SECURITY. THE AIM OF THE COURSE IS TO PROVIDE STUDENTS WITH THE NECESSARY SKILLS TO BE PROFESSIONALS IN SECURE COMMUNICATION BETWEEN EMBEDDED DEVICES AND DATA PROTECTION IN IOT APPLICATIONS, AND IN PARTICULAR EXPERTS IN EVALUATING THE SECURITY LEVEL OF AN IOT SYSTEM AND HOW TO INCREASE ITS SECURITY. PROTECTIONS. THE COURSE AIMS TO PROVIDE A SOLID, PRACTICAL AND USEFUL UNDERSTANDING OF HOW HACKERS ACT AGAINST IOT SYSTEMS, FOCUSING ON HOW THEIR OWN METHODS AND TOOLS CAN BE USED TO PROTECT COMPUTER SYSTEMS AGAINST ATTACKS. THE STUDENT WILL POSSESS THE NECESSARY TECHNICAL BACKGROUND FOR THE IMPLEMENTATION OF SECURITY SOLUTIONS ON THE MAIN BOARDS SUCH AS ARDUINO, RASPBERRY OR STM32, AND METHODOLOGICAL WITH RESPECT TO THE THEORIES, PRINCIPLES AND TECHNIQUES OF SECURITY AND PRIVACY PARTICULARLY APPROPRIATE FOR THE IOT DOMAIN, TECHNIQUES ASSESSMENT AND ANALYSIS OF VULNERABILITY POSSIBILITIES, APPLICATION OF THE GDPR TO THE SECURITY CONTEXT IN THE IOT DOMAIN. FINALLY, THE STUDENT WILL LEARN WHAT IS NECESSARY TO APPLY IOT SECURITY CONCEPTS AND THEORIES TO DESIGN AND IMPLEMENT IOT SYSTEMS SECURELY, DESIGN AND DEVELOP SERVICES THAT LEVERAGE BLOCKCHAIN OR OTHER ADVANCED SECURITY SOLUTIONS IN THE IOT DOMAIN, AND USE TECHNIQUES FOR VULNERABILITY ANALYSIS OF AN IOT SOLUTION. |
Prerequisites | |
---|---|
COMPUTER NETWORKS, COMPUTER ARCHITETURES, OPERATING SYSTEMS, COMPUTER PROGRAMMING |
Contents | |
---|---|
INTRODUCTION TO IOT (12 HOURS): ANATOMY AND TAXONOMY OF SENSORS; TYPES OF BOARDS AND THEIR INTERNALS & ARCHITECTURAL STACK; SENSOR HARDWARE: THE HARDWARE PLATFORMS; SOFTWARE ABSTRACTIONS FOR SENSORS: OPERATING SYSTEMS; PROGRAMMING LANGUAGES; MIDDLEWARE AND COMMUNICATION SOLUTIONS; CLOUD SUPPORT; SIMULATION. IOT SECURITY (12 HOURS): INTRODUCTION TO THE KEY PROPERTIES FOR SECURITY AND PRIVACY IN IOT, SURVEY OF IOT VULNERABILITIES AND ATTACKS, AND MAIN COUNTERMEASURES AT THE HARDWARE, NETWORK AND TRANSPORT LEVEL. ADVANCED SERVICES (12 HOURS): CLOUD SECURITY, EXPLOITATION OF BLOCKCHAIN FOR SECURITY-RELATED SERVICES IN THE IOT, LIGHTWEIGHT CRYPTOGRAPHY, IOT AUTHENTICATION AND AUTHORIZATION, LIGHTWEIGHT KEY MANAGEMENT. IOT SECUIRTY LABORATORY (9 HOURS): ARDUINO AND STM32 PROGRAMMING IN SECURITY AND APPLICATION OF THE TECHNIQUES STUDIED. |
Teaching Methods | |
---|---|
CLASSROOM LECTURES WITH PRACTICAL EXAMPLES TO BE DEVELOPED TOGETHER WITH THE STUDENTS. |
Verification of learning | |
---|---|
PRACTICAL EXAM CONSISTING IN THE DEVELOPMENT OF A SIMPLE IOT APPLICATION TO VERIFY THE CONCRETE ABILITY TO WRITE APPS WITH SECURITY MEANS TO PROVIDE A SUITABLE DEGREE OF PROTECTION AT THE SENSOR, CLOUD AND COMMUNICATION LEVELS, ORAL EXAM WITH A SERIES OF QUESTIONS CONCERNING BOTH GENERAL KNOWLEDGE AND SPECIFIC TECHNICAL PROBLEMS TO VERIFY THE STUDENT'S KNOWLEDGE ON SECURITY ISSUES AND SOLUTIONS APPLIED TO THE CONTEXT OF IOT APPLICATIONS AND PLATFORMS. |
Texts | |
---|---|
THERE IS NO TEXTBOOK. REFERENCES AND LEARNING MATERIAL WILL BE PROVIDED. |
More Information | |
---|---|
HTTP://ELEARNING.INFORMATICA.UNISA.IT/EL-PLATFORM/LOGIN/INDEX.PHP |
BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2024-11-18]