Roadmap of Cybersecurity in the Internet of Things (Course Materials are available at Blackboard System)
- Attendance (5 points), midterm exam (20 points), final exam (30 points), and projects (45 points)
- (20 points final exam + 10 points final paper for graduate student)
- Projects
- (10 p) Building a voice asssitant skill (Alexa)
- (10 p) Experiments on https and certificate
- (10 p) Experiments on ARP poisoning attack and denial of service attack
- (15 p) Team project on IoT
- Week 1
- Introduction to course, and introduction to IoT
- IoT security challenges and security incidents
- IoT security design principles
- Week 2
- Voice assistant system and home IoT privacy
- Privacy techniques to protect home IoT privacy
- Introduction to Alexa skills
- Week 3
- Voice assitant experiments: Alexa Practice with Fact and CLI
- Voice assitant experiments: Alexa Practice with SLOT and JSON
- Voice authentication and home IoT security
- Week 4
- Security techniques to protect home IoT security
- Introduction to RasperryPi
- IoT applications with RasperryPi, and demo of RasperryPi
- Week 5
- Demo: Using Alexa to remotely control RasperryPi
- Demo: Using htp post to remotely control RasperryPi
- Demo: Running Google Home on RasperryPi
- Week 6
- Network security: SSL/TLS
- Network security: Building trust with https. Checking https traffic on virtual machine
- Network security: Demo: certificate and https
- Week 7
- Midterm review
- Mitterm exam
- IoT crypto basis: password authentication and discussion on dictionary attacks
- Week 8
- IoT crypto basis: hash and signature
- IoT crypto basis: symmetric encryption and key distribution center
- IoT crypto basis: asymmetric encryption and certificate authority
- Week 9
- Public key cryptosystem: Advantage and computational assumption, factoring challenge
- RSA encryption and its security analysis
- RSA signature and its security analysis
- Week 10
- Network security: ARP table and ARP protocol
- Network security: ARP poisoning attacks on unencrypted http traffic
- Network security: TCP protocol and SYN flooding attacks
- Week 11
- Bitcoin. What is the crypto currency? What security needs to be guaranteed?
- Blockchain from user's perspecive. Transactions, blocks, and blockchains.
- Blockchain from miner's perspective. Proof of work, fork problem, and consensus.
- Week 12
- Blockchain summary and its applications
- IoT challenges and the need of Blockchain
- Blockchain and IoT case study
- Week 13
- IoT application 1: Autonomous Vehicles
- IoT application 2: Medical Implantables
- IoT application 3: Industrial Control System
- Week 14
- Final review
- Presentation session 1 (3 groups)
- Presentation session 2 (3 groups)
- Week 15
- Q&A
- Q&A