Advanced Topics In IoT Security
General Information
Title: Advanced Topis in IoT Security
Lecturer: Mohammad Hamad, Sebastian Steinhorst
Loaction: 4981
Time: Each Wednesday, 9:00-12:00
Language: Lecture in English language.
Credits: 5 ECTS credits
Duration: 3 SWS lecture
Application Process
Due to the limitted numbers of topics we use an application process to assign the topics.
If you are interested in one of the topics below, please send your application to mohammad.hamad@tum.de. Express your interest and explain why you want to have that specific topic and why you think that you are most suitable for the topic. This allows us to choose the most suitable candidate for the desired topic to maximize the course's learning outcome and to avoid dropouts. Also, you can indicate a second topic that you would like to take, such that we can still find a topic for you if your primary choice is not available. Additionally, If none of the topics interest you, you can propose a topic you wish to investigate. We have a place for three topics that the students can suggest. The topics should be in the domain of IoT/CPS security.
Deadline: We encourage you to apply until the 15.10.2023. Afterwards we will assign the topics and notify all applicants. Once you are given the topic, we will ask for your confirmation.
Topics
This semester we offer the following topics:
-
Cybersecurity Incident Response Systems using Reinforcement Learning --[ASSIGNED]
Seed: Intrusion Response Systems for Cyber-Physical Systems: A Comprehensive Survey
-
6G Security Challenges --[STILL OPEN!]
Seed: Security and Privacy on 6G Network Edge: A Survey -
Contextual attacks on IoT environments --[ASSIGNED]
Seed: ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks -
Cloud-based IoT access control --[STILL OPEN!]
Seed: P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies -
Time Synchronization in vehicular systems --[ASSIGNED]
Seed: Time synchronization in vehicular ad-hoc networks: A survey on theory and practice -
Digital Twin for automotive security --[STILL OPEN!]
Seed: Digital Twin Analysis to Promote Safety and Security in Autonomous Vehicles -
Proposed by a Student: --[ASSIGNED]
-
Proposed by a Student: [STILL OPEN!]
-
Proposed by a Student: [STILL OPEN!]
Description of Achievement and Assessment Methods
Achievement of the intended learning outcomes is assessed by submitting a four pages seminar paper (50%), regular discussions about the progression of the project and next steps (25%), and a 30-minute oral presentation with a discussion of the paper topic (25%).
Intended Learning Outcomes
Upon successful completion of the course, students are able to:
• Demonstrate knowledge of the security issues of the Internet of Things
• Understanding the vulnerabilities that threaten IoT systems and the countermeasures used to protect this system.
• Develop critical thinking skills, lead a scientific discussion, write and present research ideas.
Content
In this seminar, students will broaden their understanding of IoT security by discussing recent attacks and vulnerabilities that threaten different IoT systems (such as intelligent vehicles, e-health systems, etc.) and countermeasure approaches proposed to mitigate these attacks. Many topics will be offered, and each student needs to choose one topic and write a short paper about it. The seminar will mimic the workflow of real conferences: Students need to submit research papers, perform peer-review to other submissions, and finally present their papers.
Teaching and Learning Methods
Each participant prepares a seminar paper based on the topic that (s)he selects. At the end of the semester, students need to present their papers in front of the seminar participants. During the semester, students need to present their progress and lead a discussion about their topic every second week. Other participants need to engage in the discussion. In the introductory parts of the seminar, the skills that students need to write their papers will be taught in a teacher-centered style.