100% found this document useful (2 votes)
2K views

Security in IoT - Syllabus (FINAL)

This document outlines the security considerations and approaches for Internet of Things (IoT) systems. It discusses cryptographic techniques like encryption, hashing, and digital signatures that can provide confidentiality, integrity and authentication in IoT. It also addresses other security issues like access control, privacy, and intrusion detection. The document describes potential security threats to IoT like unauthorized access and side-channel attacks. It then outlines several units that cover cryptographic fundamentals, identity and access management, privacy preservation techniques, and approaches to cloud security for IoT systems.

Uploaded by

Jay Mehta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
2K views

Security in IoT - Syllabus (FINAL)

This document outlines the security considerations and approaches for Internet of Things (IoT) systems. It discusses cryptographic techniques like encryption, hashing, and digital signatures that can provide confidentiality, integrity and authentication in IoT. It also addresses other security issues like access control, privacy, and intrusion detection. The document describes potential security threats to IoT like unauthorized access and side-channel attacks. It then outlines several units that cover cryptographic fundamentals, identity and access management, privacy preservation techniques, and approaches to cloud security for IoT systems.

Uploaded by

Jay Mehta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Security in IoT

Possible Areas:
1. Applied Cryptography and Intrusion Detection
2. One way Hash Function and Integrity
3. Encryption Algorithms and Confidentiality
4. Digital Signature and Authentication
5. Intrusion Detection
6. Discussion on security threats on specific IoT applications
7. General Cyber Security concepts in IoT
8. Security threats in IoT (Unauthorized access, Side-channel attacks, Safety risks)
9. Quantum security
10. Block chain  Crypto Currency
11. Cryptanalysis Vs. Stagenoanalysis
12. Tools in (S/W, and H/W) in IoT

UNIT – I INTRODUCTION: SECURING THE INTERNET OF THINGS


Security Requirements in IoT Architecture, Security in Enabling Technologies, Security Concerns in IoT
Applications. Security Architecture in the Internet of Things, Security Requirements in IoT, Insufficient
Authentication/Authorization, Insecure Access Control, Threats to Access Control, Privacy, and
Availability, Attacks Specific to IoT. Vulnerabilities, Secrecy and Secret, Key Capacity,
Authentication/Authorization for Smart Devices, Transport Encryption, Attack and Fault trees, The
secure IoT system implementation lifecycle.
UNIT – II CRYPTOGRAPHIC FUNDAMENTALS FOR IOT
Cryptographic primitives and its role in IoT, Encryption and Decryption, Hashes, Digital Signatures,
Random number generation, Cipher suites, Key management fundamentals, Cryptographic controls
built into IoT messaging and communication protocols, IoT Node Authentication
UNIT – III IDENTITY & ACCESS MANAGEMENT SOLUTIONS FOR IOT
Identity lifecycle, Authentication credentials, IoT IAM infrastructure, Authorization with
Publish/Subscribe schemes, Access control
UNIT – IV PRIVACY PRESERVATION FOR IOT
Privacy Preservation Data Dissemination, Privacy Preservation for IoT Used in Smart Building, Exploiting
Mobility Social Features for Location Privacy Enhancement in Internet of Vehicles, Lightweight and
Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory
Sensing.
UNIT – V CLOUD SECURITY FOR IOT
Cloud services and IoT, Offerings related to IoT from cloud service providers, Cloud IoT security controls,
An enterprise IoT cloud security architecture, New directions in cloud enabled IoT computing

Practical Tools:
1. IoTFy tool
2. ForeScout CounterACT
3. LogRhythm Netmon
4. Trustwave
5. Zingbox

You might also like