Doctoral course: IoT security – protocol design and implementation
Event information
Time
-
Lecturers: Dr. An Braeken (Vrije Universiteit Brussel, Belgium) and Mr. Thibaut Vandervelde (Vrije Universiteit Brussel, Belgium)
Dates and venues:
5.12 M101
7.12 TS335
8.12 Room 131
Hours: 12 h: Lectures: 9.00–11.00. and 12:00–14:00 (with 15 minutes breaks)
Assessment: 100% Written report, lab work and attendance.
Credit Units: 3 ECTS (1 ECTS = 27 hours of studies; Teaching hours = 12 h; Independent studies = 59 h; Lab work and assignments = 10 h)
Registration: Students should register for the course by 15th November, 2022. Background reading and preparatory material will be provided in advance of the start of the course.
Moodle space: https://moodle.oulu.fi/course/view.php?id=15986
Peppi code: DP00AK94
Course content and learning objectives: This course aims to provide an intense tutorial and knowledge exchange to graduate students and researchers on key topics regarding IoT security in 5G and future wireless networks. The learning objectives of this course are:
- Students are able to name the key security threats and requirements for IoT networks.
- Students are able to understand the structure and design of IoT security protocols for different types of applications.
- Students are able to identify issues in existing security protocols and to propose solutions.
- Students are able to discuss the research challenges and promising directions for security of future wireless networks.
The learning contents of this course will include:
- Pre-assigned reading material
- Lecture slides
- Final report early draft (for students to work on as a voluntary post-event activity)
- Lab material
- nRF52840 + laptop
Target Audience: This is an advanced course targeted at Master's and Doctoral students who have knowledge of basics in cryptography and security.
Lecture Schedule:
Day 1: Fundamentals of IoT security and symmetric key based protocols
- Introduction to IoT security
- Basics of security protocol design
- Network protocols (Zigbee, LoRa, Bluetooth)
- Symmetric key based standard protocols
- Lightweight symmetric key based protocols
(4 h lecture + 15 hours independent studies)
Day 2: Public key based security protocols
- Client-server protocols
- Protocols for fog-cloud computing architecture
- Group based protocols
(4 h lecture + 15 hours independent studies)
Day 3: Lab session and group work (1 – Acquaintance with tools and libraries 2- Collaborative work session for the final report)
- Introduction to the lab work and environment
- Lab activity
- Planning and task assignment for the collaborative final report
- Evaluation and feedback
(4 h lecture + 29 hours independent studies)
Assessment:
The course assessment will be based on the written report and lab work. (10 hours)