Checking date: 10/07/2020

Course: 2020/2021

IoT Security
Master in Internet of Things: Applied Technologies (Plan: 428 - Estudio: 356)

Coordinating teacher: CAMARA NUÑEZ, MARIA CARMEN

Department assigned to the subject: Computer Science and Engineering Department

Type: Compulsory
ECTS Credits: 3.0 ECTS


Requirements (Subjects that are assumed to be known)
Core Competencies CB6 Possess and understand the knowledge that provides a basis or opportunity to be original in the development and/or application of ideas, often in a research context CB7 Students are able to apply their acquired knowledge and problem-solving skills in new or unfamiliar environments within broader (or multidisciplinary) contexts related to their area of study CB8 Students are able to integrate knowledge and deal with the complexity of making judgements based on information that is incomplete or limited, including reflections on the social and ethical responsibilities associated with applying their knowledge and judgements CB9 Students are able to communicate their findings and the ultimate knowledge and reasons behind them to specialist and non-specialist audiences in a clear and unambiguous manner General competencies CG2 capacity to collect and analyse existing knowledge in the different areas of IoT, in an autonomous manner, and capacity to make a proposal of possible solutions to the problems posed. CG7 capacity to know how to communicate (orally and in writing) the conclusions - and the knowledge and ultimate reasons that support them - to specialised and non-specialised audiences clearly and unambiguously. Specific competences SG5 Ability to design, develop, manage and evaluate security assurance mechanisms for information processing and access in computationally limited devices and IoT networks. SG6 Ability to apply mathematical, statistical and artificial intelligence methods to model, design and develop intelligent applications, services and systems in the field of IoT. CE10 Ability to integrate the different systems of perception and process control from both the hardware and software point of view. CE13 Ability to apply the legislation, regulation and standardisation of IoT. LEARNING RESULTS The learning outcomes that students should are: - Knowing and applying the law and legal aspects of IoT. - Know the models and reference structures of IoT. - Ability to analyse, design and control systems and services - Know the safety risks inherent in an IoT environment. - Know the physical safety measures applicable to mobile devices. - Know and apply the fundamental techniques for protecting the information stored in mobile devices. - Master the main safety protocols for mobile communications and their application spectrum.
Description of contents: programme
Block 1. Introduction a. Introduction to cybersecurity. b. Introduction to the IoT. Block 2. Cybersecurity in IoT devices a. Vulnerabilities b. Attacks c. Countermeasures Block 3. Security Analysis a. Cryptographic protocols b. Cryptanalysis
Learning activities and methodology
TRAINING ACTIVITIES IN THE SYLLABUS RELATING TO SUBJECTS AF1 Theoretical class AF4 Practical sessions in the lab AF6 Group work AF7 Individual Student Work AF8 Partial and final examinations Code activity Nº Total hours Nº Hours Attendance % Attendance Student AF1 26 26 100 AF4 16 16 100 AF6 40 0 0 AF7 64 0 0 AF8 4 4 100 TOTAL SUBJECT MATTER 150 46 31% TRAINING TEACHING METHODOLOGIES OF THE PLAN RELATING TO MATTERS MD1 Presentations in the teacher's classroom with a computer and audiovisual support, in which the main concepts of the subject are developed, and the bibliography is provided to complement the students' learning. MD2 Critical reading of texts recommended by the subject teacher: Press articles, reports, manuals and/or academic articles, either for later discussion in class or to expand and consolidate knowledge of the subject. MD3 Resolution of practical cases, problems, etc. raised by the teacher individually or in a group. MD4 Presentation and discussion in class, under the moderation of the professor of topics related to the content of the subject, as well as practical cases. MD5 Elaboration of works and reports individually or in a group.
Assessment System
  • % end-of-term-examination 50
  • % of continuous assessment (assigments, laboratory, practicals...) 50

Basic Bibliography
  • Aaron Guzman, Aditya Gupta. IoT Penetration Testing Cookbook: Identify vulnerabilities and secure your smart devices. Packt Publishing. 2017
  • D. Uckelmann, M. Harrison and F. Michahelles. Architecting the Internet of Things. Springer-Verlag Berlin Heidelberg. 2011
  • Dimitrios Serpanos, Marilyn Wolf . Internet-of-Things (IoT) Systems: Architectures, Algorithms, Methodologies. Springer. 2018
  • FTC Staff Report. Internet of Things: Privacy & Security in a Connected World. FTC. 2015
  • Francis daCosta. Rethinking the Internet of Things: A Scalable Approach to Connecting Everything. Apress. 2014
  • IoT Hackers Handbook. IoT Hackers Handbook: An Ultimate Guide to Hacking the Internet of Things and Learning IoT Security . IoT Hackers Handbook. 2017
Additional Bibliography
  • N. Jeyanthi, Ajith Abraham, Hamid Mcheick. Ubiquitous Computing and Computing Security of IoT. Springer. 2018
  • Sunil Cheruvu, Anil Kumar, Ned Smith, David Wheeler. Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform security deployment. Apress. 2019

The course syllabus may change due academic events or other reasons.