FI:PV285 IoT Security - Course Information
PV285 IoT Security
Faculty of InformaticsSpring 2025
- Extent and Intensity
- 2/2/0. 3 credit(s) (plus extra credits for completion). Type of Completion: k (colloquium).
In-person direct teaching - Teacher(s)
- doc. Ing. Václav Oujezský, Ph.D. (lecturer)
doc. Mgr. Karel Slavíček, Ph.D. (lecturer) - Guaranteed by
- doc. Mgr. Karel Slavíček, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Prerequisites
- PV284 Introduction to IoT || SOUHLAS
Basic knowledge of computer architecture and operating systems, OS Linux, ABC of programming in C/C++. Common knowledge of IoT architecture, MCUs, sensors, and communication busses and protocols. Completion of the course IoT Introduction is recommended. - Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
The capacity limit for the course is 50 student(s).
Current registration and enrolment status: enrolled: 0/50, only registered: 0/50, only registered with preference (fields directly associated with the programme): 0/50 - fields of study / plans the course is directly associated with
- Cybersecurity (programme FI, B-CS)
- Course objectives
- The goal is to give students an overview of: * HW and SW components used to the ensure security of IoT systems * security risks of IoT systems and their mitigation
- Learning outcomes
- After completion of the course, the student will be able to: * understand security risks of IoT systems * have an overview of HW components usable to the enforce security of (not only) IoT systems * identify and mitigate security risks in IoT systems
- Syllabus
- 1. Introduction, HW components overview, cryptography fundamentals 2. MCUs with cryptography acceleration 3. Dedicated chips for secure storage of PKI private keys, dedicated chips for cryptography algorithms computation 4. HW for user authentication and biometric sensors 5. Blockchain and smart contracting 6. RFID, NFC, barcode, and QR code 7. Tools for communication eavesdropping and analysis 8. Communication busses attack 9. Protocol suite for encrypting data communications 10. Biometric sensors and authentication HW attack 11. RSA key storage attack 12. Data sources and actuators attack
- Teaching methods
- lectures, lab exercises, student projects
- Assessment methods
- student projects evaluation, activity on lab exercises, discussion
- Language of instruction
- English
- Further comments (probably available only in Czech)
- The course is taught annually.
The course is taught: every week. - Teacher's information
- References and material for self-study (overlaps with IoT Introduction course): ● https://modbus.org/docs/Modbus_Application_Protocol_V1_1b3.pdf ● John S. Rinaldi. 2015. Modbus: The Everyman's Guide to a protocol that has stayed relevant in automation for over 30 years, Createspace Independent Publishing Platform. ● Pfeiffer, O. and Ayre, A. and Keydel, C.: Embedded Networking with CAN and CANopen isbn 9780976511625, 2008, Copperhill Technologies Corporation ● Dominique Paret: Flexray and its Applications: Real Time Multiplexed Network, 2012, ISBN:9781119979562 DOI:10.1002/9781119964063 John Wiley & Sons, Ltd ● By René Beuchat, Florian Depraz, Sahand Kashani, Andrea Guerrieri: Fundamentals of System-on-Chip Design on Arm Cortex-M Microcontrollers ISBN 978-1-911531-33-3 ● https://developer.ibm.com/technologies/iot/tutorials/ ● Michael Margolis: Arduino Cookbook, 2nd Edition, 2011, O'Reilly Media, Inc., ISBN: 9781449313876
- Enrolment Statistics (Spring 2025, recent)
- Permalink: https://is.muni.cz/course/fi/spring2025/PV285