Advanced Topics In IoT Security
General Information
Title: Advanced Topis in IoT Security
Lecturer: Mohammad Hamad, Sebastian Steinhorst
Loaction: 3999
Time: Each Wednesday, 9:45-12:00
Attending lectures: Mandatory
Language: Lecture in English language.
Credits: 5 ECTS credits
Duration: 3 SWS lecture
Application Process
Due to the limitted numbers of topics we use an application process to assign the topics.
If you are interested in one of the topics below, please send your application to mohammad.hamad@tum.de. Express your interest and explain why you want to have that specific topic and why you think that you are most suitable for the topic. This allows us to choose the most suitable candidate for the desired topic to maximize the course's learning outcome and to avoid dropouts. Also, you can indicate a second topic that you would like to take, such that we can still find a topic for you if your primary choice is not available. Additionally, If none of the topics interest you, you can propose a topic you wish to investigate. We have a place for three topics that the students can suggest. The topics should be in the domain of IoT/CPS security.
Deadline: We encourage you to apply until the 16.04.2023. Afterwards we will assign the topics and notify all applicants. Once you are given the topic, we will ask for your confirmation.
Topics
ID | Topic | status |
1 | Cybersecurity Inciedent Response Systems using Reinforcement Learning Seed: Intrusion Response Systems for Cyber-Physical Systems: A Comprehensive Survey | Assigned |
2 | Bootstrapping Remote Secure Key Infrastructure (BRSKI) Seed: RFC8995 | Assigned |
3 | State-aware Security for Smart Vehicles Seeds:
| Assigned |
4 | Message Authentication in Automotive Ethernet Networks Seeds:
| Assigned |
5 | Using TLS to Secure Automotive Communication Seed: TLS to Secure In-Vehicle Networks | Assigned |
6 | Comparative Analysis of NIST Lightweight Cryptography for IoT Applications Seed: Analysis of Practical Application of Lightweight Cryptographic Algorithm ASCON | Assigned |
7 | Wireless MitM Attacks and their impact on Wireless Time Synchronization Seeds:
| Assigned |
8 | Proposed by Student: Software Defined Networking for Automotive | Assigned |
9 | You can choose your own topic! | Avilable |
10 | You can choose your own topic! | Avilable |
Description of Achievement and Assessment Methods
Achievement of the intended learning outcomes is assessed by submitting a four pages seminar paper (50%), regular discussions about the progression of the project and next steps (25%), and a 30-minute oral presentation with a discussion of the paper topic (25%).
Intended Learning Outcomes
Upon successful completion of the course, students are able to:
• Demonstrate knowledge of the security issues of the Internet of Things
• Understanding the vulnerabilities that threaten IoT systems and the countermeasures used to protect this system.
• Develop critical thinking skills, lead a scientific discussion, write and present research ideas.
Content
In this seminar, students will broaden their understanding of IoT security by discussing recent attacks and vulnerabilities that threaten different IoT systems (such as intelligent vehicles, e-health systems, etc.) and countermeasure approaches proposed to mitigate these attacks. Many topics will be offered, and each student needs to choose one topic and write a short paper about it. The seminar will mimic the workflow of real conferences: Students need to submit research papers, perform peer-review to other submissions, and finally present their papers.
Teaching and Learning Methods
Each participant prepares a seminar paper based on the topic that (s)he selects. At the end of the semester, students need to present their papers in front of the seminar participants. During the semester, students need to present their progress and lead a discussion about their topic every second week. Other participants need to engage in the discussion. In the introductory parts of the seminar, the skills that students need to write their papers will be taught in a teacher-centered style.