CEI344 Iot Security Syllabus:

CEI344 Iot Security Syllabus – Anna University Regulation 2021

COURSE OBJECTIVES:

▪ To understand the security requirements in IoT.
▪ To learn the fundamentals of cryptographic in IoT
▪ To understand the working of embedded devices in the IoT
▪ To familiarize with IoT protocols in security
▪ To realize security issues for various applications using case studies

UNIT I INTRODUCTION

Introduction to IoT Security – Vulnerabilities, Attacks and Countermeasures. Information Assurance. Attack types. New security threats and vulnerabilities. Fault Trees and CPS. Threat Modeling. Attack, Defense, and Network Robustness of Internet of Things, A Solution-Based Analysis of Attack Vectors on Smart Home Systems.

UNIT II SECURITY MANAGEMENT & CRYPTOLOGY

Building security in to design and development, Safety and security design, Security Management & Cryptology- Security Controls – Authentication, Confidentiality, Integrity; Access Control, Key Management, Communication and messaging Protocols, Cipher – Symmetric Key Algorithms, Public Private Key Cryptography; Attacks – Dictionary and Brute Force, Lookup Tables, Reverse Look Tables, Rainbow Tables, Hashing – MDS, SHA256. SHA 512, Ripe MD, WI, Data Mining.

UNIT III EMBEDDED DEVICES

Attack Surface and Threat Assessment – Embedded Devices – UART, SPI, I2C, JTAG, Attacks– Software and cloud components, Firmware devices, Web and Mobile Applications.

UNIT IV IoT PROTOCOLS

IoT Protocol Built-in Security Features – Transport Layer, COAP, UDP, TCP, MQTT, SSL/TLS, DTLS, LIGHT WEIGHT M2M, XMPP, Zigbee, LoRa, BLE, Kerberos, Cloud security for IoT.

UNIT V IoT APPLICATIONS

Case Studies and Discussion: Smart Agriculture, Cities, Grid, Healthcare, Smart Homes, smart street lighting, Smart building, Smart parking, smart irrigation, Supply Chain, and Transportation, Application of Security Concepts to Create IoT system.

TOTAL: 45 PERIODS

SKILL DEVELOPMENT ACTIVITIES (Group Seminar/Mini Project/Assignment/Content Preparation / Quiz/ Surprise Test / Solving GATE questions/ etc)

1. Needed to grasp business intelligence include sensor data analysis, data center management, predictive analytics, and programming in Hadoop and NoSQL.
2. Knowledge in UX and UI Design
3. Develop well-versed in both iOS and Android app development
4. Ability to program interfaces such as GPIO and I2C
5. Should have basic OSI stack knowledge, especially connectivity protocols
6. Ability to connect automatic API testing with manual testing
7. Ability to read and interpret data meaningfully in healthcare.
8. Familiar with machine learning and AI.
9. cognizant of changes in programming languages and evolving hardware platforms.

COURSE OUTCOMES:

Students able to
CO1 Definethe security requirements in IoT Architecture.L1
CO2 Explain the different cryptographic techniques in IoT Security. L5
CO3 Classifyvarious embedded devices related to IoT. L2
CO4 Analyze IoT protocols. L4
CO5 Interpret IoT applications in several fields. L3

TEXT BOOKS:

1. Brian Russell, Drew Van Duren, “Practical Internet of Things Security”, Packt Publishing Limited, 2nd Edition,2018.
2. Fei Hu, “Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations,” CRC Press (Taylor & Francis Group), 2016, ISBN:978-1-4987-23190.
3. Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler, “Demystifying Internet of Things Security”, 2020.

REFERENCES:

1. Shancang Li and Li Da Xu, “Securing the Internet of Things”, Elsevier, 2017.
2. Sridipta Misra, Muthucumaru Maheswaran, Salman Hashmi, “Security Challenges and Approaches in Internet of Things,” Springer, 2016.
3. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A Hands-on approach,” VPT Publishers, 2014, ISBN: 978-0996025515.
4. IoT PROTOCOLS – https://www.avsystem.com/blog/iot-protocols-and-standards/
5. IoT APPLICATIONS – https://www.jigsawacademy.com/top-uses-of-iot/