githubEdit

CSI501 / IOT

Syllabus

Resources

chevron-rightMI: Securing the Internet of Thingshashtag
  • Security requirements in IoT architecture

  • Security in enabling technologies

  • Cipher suites

  • Security architecture in the Internet of Things

  • Security requirements in IoT

    • Insufficient authentication/authorization

    • Insecure access control

    • Threats to access control, privacy, and availability

  • Attacks specific to IoT

  • Vulnerabilities

  • Secrecy and secret-key capacity

  • Authentication/authorization for smart devices

  • Transport encryption

  • Attack trees and fault trees

chevron-rightMII: Cryptographic Fundamentals for IoThashtag
  • Cryptographic primitives and their role in IoT

  • Encryption and decryption

  • Hashes

  • Digital signatures

  • Random number generation

  • Cipher suites

  • Key management fundamentals

  • Cryptographic controls in IoT messaging and communication protocols

  • IoT node authentication

chevron-rightMIII: Identity and Access Management for IoThashtag
  • Identity lifecycle

  • Authentication credentials

  • IoT IAM infrastructure

  • Authorization with publish/subscribe schemes

  • Access control

chevron-rightMIV: Privacy Preservation and Trust Models for IoThashtag
  • Concerns in data dissemination

  • Lightweight and robust privacy protection schemes

  • Trust and trust models for IoT

  • Self-organizing things

  • Preventing unauthorized access

chevron-rightMV: Cloud Security for IoT Cloud Services and IoThashtag
  • IoT offerings from cloud service providers

  • Cloud IoT security controls

  • Enterprise IoT cloud security architecture

  • New directions in cloud-enabled IoT computing

triangle-exclamation

Notes

MidTerm

EndSem

[⤓]

Question Directory

[⤓]

Assignment Questions

[⤓]

Previous Year Questions

Mid-Sem-PYQ

End-Sem-PYQ

External Sources

[⤓]


Last updated