Type of studies | Title |
---|---|
Master Academic Studies | Information Security (Year: 1, Semester: Summer) |
Master Academic Studies | Software Engineering and Information Technologies (Year: 1, Semester: Summer) |
Master Academic Studies | Computing and Control Engineering (Year: 1, Semester: Summer) |
Master Academic Studies | Information Engineering (Year: 1, Semester: Summer) |
Master Academic Studies | Information and Analytics Engineering (Year: 1, Semester: Summer) |
Category | Theoretical-methodological |
Scientific or art field | Applied Computer Science and Informatics |
ECTS | 6 |
Students learn about the methods and techniques for modeling and implementing the security aspects of the Internet of Things with data protection and privacy preservation in mind.
After successfully completing the course, students gain theoretical and practical knowledge about the secure engineering of the Internet of Things, data protection and privacy preservation. The students are able to design, implement and evaluate the state of the art security techniques for IoT devices. Also, the students are able to understand different security threats in the Internet of Things and the methods for their detection, prevention, and remediation.
Introduction to secure engineering of the Internet of Things: definition, basic concepts, security requirements, types of devices and architectures. Types of attacks: wireless reconnaissance and mapping, physical security attacks, security protocol attacks, application security attacks. Principles of secure engineering in IoT: building security into design and development, threat modeling, compliance, system monitoring, penetration testing, security training and education. Cryptography in IoT: algorithms for encryption, decryption, hash functions, digital signatures, cryptographic controls built into IoT messaging and communication protocols, key exchange. Identity and access management in IoT: registration and device lifecycle, authentication mechanisms, IoT IAM (Identity and Access Management) infrastructure, access control schemes, trust models. Data protection and privacy preservation in IoT: challenges and requirements for privacy preservation in IoT, privacy impact assessment, schemes for privacy protection. Cloud security for IoT: cloud services for IoT, cloud security controls for IoT, new approaches in cloud computing and IoT integration.
Lectures. Computer practice. Consultations. The examination is oral. The final grade is formed on the basis of achievement in the laboratory practice classes and oral examination.
Authors | Title | Year | Publisher | Language |
---|---|---|---|---|
2017 | English | |||
2013 | English | |||
2017 | English | |||
2015 | English | |||
2017 | English | |||
2016 | English | |||
2016 | English |
Course activity | Pre-examination | Obligations | Number of points |
---|---|---|---|
Oral part of the exam | No | Yes | 50.00 |
Project defence | Yes | Yes | 50.00 |
Full Professor
Assistant - Master
© 2024. Faculty of Technical Sciences.
Address: Trg Dositeja Obradovića 6, 21102 Novi Sad
© 2024. Faculty of Technical Sciences.