IOT SECURITY

CHRISTIANCARMINE ESPOSITO IOT SECURITY

0522500140
COMPUTER SCIENCE
EQF7
COMPUTER SCIENCE
2024/2025



YEAR OF COURSE 1
YEAR OF DIDACTIC SYSTEM 2016
AUTUMN SEMESTER
CFUHOURSACTIVITY
945LESSONS
Objectives
THE COURSE INTRODUCES THE FUNDAMENTAL ASPECTS OF IOT APPLICATIONS, FROM HARDWARE PLATFORMS AND OPERATING SYSTEMS TO COMMUNICATION PROTOCOLS AND CLOUD SOLUTIONS, AND PRESENTS THE POSSIBLE VULNERABILITIES AND ATTACKS THAT CHARACTERIZE EACH LAYER OF CURRENT IOT ARCHITECTURES (FROM PHYSICAL ATTACKS TO COMMUNICATION ANOMALIES AND CRITICALITY OF THE SOFTWARE), DESCRIBING THE SET OF EXISTING SOLUTIONS TO GUARANTEE ADEQUATE LEVELS OF SECURITY. THE AIM OF THE COURSE IS TO PROVIDE STUDENTS WITH THE NECESSARY SKILLS TO BE PROFESSIONALS IN SECURE COMMUNICATION BETWEEN EMBEDDED DEVICES AND DATA PROTECTION IN IOT APPLICATIONS, AND IN PARTICULAR EXPERTS IN EVALUATING THE SECURITY LEVEL OF AN IOT SYSTEM AND HOW TO INCREASE ITS SECURITY. PROTECTIONS. THE COURSE AIMS TO PROVIDE A SOLID, PRACTICAL AND USEFUL UNDERSTANDING OF HOW HACKERS ACT AGAINST IOT SYSTEMS, FOCUSING ON HOW THEIR OWN METHODS AND TOOLS CAN BE USED TO PROTECT COMPUTER SYSTEMS AGAINST ATTACKS. THE STUDENT WILL POSSESS THE NECESSARY TECHNICAL BACKGROUND FOR THE IMPLEMENTATION OF SECURITY SOLUTIONS ON THE MAIN BOARDS SUCH AS ARDUINO, RASPBERRY OR STM32, AND METHODOLOGICAL WITH RESPECT TO THE THEORIES, PRINCIPLES AND TECHNIQUES OF SECURITY AND PRIVACY PARTICULARLY APPROPRIATE FOR THE IOT DOMAIN, TECHNIQUES ASSESSMENT AND ANALYSIS OF VULNERABILITY POSSIBILITIES, APPLICATION OF THE GDPR TO THE SECURITY CONTEXT IN THE IOT DOMAIN. FINALLY, THE STUDENT WILL LEARN WHAT IS NECESSARY TO APPLY IOT SECURITY CONCEPTS AND THEORIES TO DESIGN AND IMPLEMENT IOT SYSTEMS SECURELY, DESIGN AND DEVELOP SERVICES THAT LEVERAGE BLOCKCHAIN OR OTHER ADVANCED SECURITY SOLUTIONS IN THE IOT DOMAIN, AND USE TECHNIQUES FOR VULNERABILITY ANALYSIS OF AN IOT SOLUTION.
Prerequisites
COMPUTER NETWORKS, COMPUTER ARCHITETURES, OPERATING SYSTEMS, COMPUTER PROGRAMMING
Contents
INTRODUCTION TO IOT (12 HOURS): ANATOMY AND TAXONOMY OF SENSORS; TYPES OF BOARDS AND THEIR INTERNALS & ARCHITECTURAL STACK; SENSOR HARDWARE: THE HARDWARE PLATFORMS; SOFTWARE ABSTRACTIONS FOR SENSORS: OPERATING SYSTEMS; PROGRAMMING LANGUAGES; MIDDLEWARE AND COMMUNICATION SOLUTIONS; CLOUD SUPPORT; SIMULATION.

IOT SECURITY (12 HOURS): INTRODUCTION TO THE KEY PROPERTIES FOR SECURITY AND PRIVACY IN IOT, SURVEY OF IOT VULNERABILITIES AND ATTACKS, AND MAIN COUNTERMEASURES AT THE HARDWARE, NETWORK AND TRANSPORT LEVEL.

ADVANCED SERVICES (12 HOURS): CLOUD SECURITY, EXPLOITATION OF BLOCKCHAIN FOR SECURITY-RELATED SERVICES IN THE IOT, LIGHTWEIGHT CRYPTOGRAPHY, IOT AUTHENTICATION AND AUTHORIZATION, LIGHTWEIGHT KEY MANAGEMENT.

IOT SECUIRTY LABORATORY (9 HOURS): ARDUINO AND STM32 PROGRAMMING IN SECURITY AND APPLICATION OF THE TECHNIQUES STUDIED.
Teaching Methods
CLASSROOM LECTURES WITH PRACTICAL EXAMPLES TO BE DEVELOPED TOGETHER WITH THE STUDENTS.
Verification of learning
PRACTICAL EXAM CONSISTING IN THE DEVELOPMENT OF A SIMPLE IOT APPLICATION TO VERIFY THE CONCRETE ABILITY TO WRITE APPS WITH SECURITY MEANS TO PROVIDE A SUITABLE DEGREE OF PROTECTION AT THE SENSOR, CLOUD AND COMMUNICATION LEVELS,
ORAL EXAM WITH A SERIES OF QUESTIONS CONCERNING BOTH GENERAL KNOWLEDGE AND SPECIFIC TECHNICAL PROBLEMS TO VERIFY THE STUDENT'S KNOWLEDGE ON SECURITY ISSUES AND SOLUTIONS APPLIED TO THE CONTEXT OF IOT APPLICATIONS AND PLATFORMS.
Texts
THERE IS NO TEXTBOOK. REFERENCES AND LEARNING MATERIAL WILL BE PROVIDED.
More Information
HTTP://ELEARNING.INFORMATICA.UNISA.IT/EL-PLATFORM/LOGIN/INDEX.PHP
Lessons Timetable

  BETA VERSION Data source ESSE3 [Ultima Sincronizzazione: 2024-11-18]