Advanced Topics In IoT Security

General Information

Title: Advanced Topis in IoT Security

Lecturer: Mohammad Hamad, Sebastian Steinhorst

Loaction:  4959

Time: Each Wednesday, 9:45-12:00

Language:  Lecture in English language.

Credits: 5 ECTS credits

Duration: 3 SWS lecture

Application Process

Please note that this is NOT the main seminar of our chair; it is an elective course.

Due to the limitted numbers of topics we use an application process to assign the topics.

If you are interested in one of the topics below, please send your application to mohammad.hamad@tum.de. Express your interest and explain why you want to have that specific topic and why you think that you are most suitable for the topic. This allows us to choose the most suitable candidate for the desired topic to maximize the course's learning outcome and to avoid dropouts. Also, you can indicate a second topic that you would like to take, such that we can still find a topic for you if your primary choice is not available. Additionally, If none of the topics interest you, you can propose a topic you wish to investigate. We have a place for two topics that the students can suggest. The topics should be in the domain of IoT/CPS security. 

Deadline: We encourage you to apply until the 15.10.2024. Afterwards we will assign the topics and notify all applicants. Once you are given the topic, we will ask for your confirmation.

Topics

  1. Processing Pipeline Attacks of Radar and LiDAR Sensors of Automated Vehicles.  
    1. paper 1: “A comparative overview of automotive radar spoofing countermeasures,” in 2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022.
    2. paper 2: “A survey on security attacks and defense techniques for connected and autonomous vehicles,” Comput. Secur.,
  2. Reproducibility of Sensor Layer Attacks on Cameras for Autonomous Vehicles
    1. Paper 1: “Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition,” in 31st USENIX Security Symposium (USENIX Security 22)
    2. Paper 2: “Invisible perturbations: Physical adversarial examples exploiting the rolling shutter effect,” in 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
  3. Feasability of blockchain solutions for identity management in real world use cases
    1. Paper 1: "A secure blockchain-enabled vehicle identity management framework for intelligent transportation systems". Comput. Electr. Eng. 2024
  4. Suggest your topic 
  5. Suggest your topic

 

Description of Achievement and Assessment Methods

Achievement of the intended learning outcomes is assessed by submitting a four pages seminar paper (50%), regular discussions about the progression of the project and next steps (25%), and a 30-minute oral presentation with a discussion of the paper topic (25%).

Intended Learning Outcomes

Upon successful completion of the course, students are able to:
• Demonstrate knowledge of the security issues of the Internet of Things
• Understanding the vulnerabilities that threaten IoT systems and the countermeasures used to protect this system.
• Develop critical thinking skills, lead a scientific discussion, write and present research ideas.

Content

In this seminar, students will broaden their understanding of IoT security by discussing recent attacks and vulnerabilities that threaten different IoT systems (such as intelligent vehicles, e-health systems, etc.) and countermeasure approaches proposed to mitigate these attacks. Many topics will be offered, and each student needs to choose one topic and write a short paper about it. The seminar will mimic the workflow of real conferences: Students need to submit research papers, perform peer-review to other submissions, and finally present their papers.

Teaching and Learning Methods

Each participant prepares a seminar paper based on the topic that (s)he selects. At the end of the semester, students need to present their papers in front of the seminar participants. During the semester, students need to present their progress and lead a discussion about their topic every second week. Other participants need to engage in the discussion. In the introductory parts of the seminar, the skills that students need to write their papers will be taught in a teacher-centered style.