Module Descriptors
IOT DESIGN AND SECURITY
COMP50080
Key Facts
Digital, Technology, Innovation and Business
Level 5
20 credits
Contact
Leader: Euan Wilson
Hours of Study
Scheduled Learning and Teaching Activities: 6
Independent Study Hours: 194
Total Learning Hours: 200
Assessment
  • WRITTEN ONLINE EXAM - 2 HOURS weighted at 50%
  • PRACTICAL ASSESSMENT - 1 HOUR weighted at 50%
Module Details
INDICATIVE CONTENT
The module aims to enhance students' understanding about the security design and development of the Internet of Things (IoT) systems, including its' architecture, technologies on each layer, and IoT-specific security vulnerabilities and threat modelling and risk management frameworks. The following key topics will be covered:



Things (Devices and services) and Connections

IoT Security Challenges

IoT Threat Modelling

IoT Device Layer Attack Surface

IoT Communication Layer Attack Surface

IoT Application Layer Attack Surface

Vulnerability Assessment and Penetration Testing of IoT Systems
ADDITIONAL ASSESSMENT DETAILS
Written online exam – A time constrained exam monitored online, covering theory of security and enabling technologies, IoT design, and understanding of vulnerability (Learning Outcomes 1, 2, and 4).

Practical Assessment - A Practical assessment to perform threat modelling activities to evaluate physical device security vulnerabilities in IoT systems (Learning Outcomes 2 and 3)
LEARNING STRATEGIES
There will be 6 contact hours dedicated to delivering lecture materials. Self-directed learning material will be made available using the VLE which will consist of self-guided virtual lab sessions.
LEARNING OUTCOMES

1. Identify and explain security, privacy and trust issues facing the Internet of Things and its enabling Technologies

Knowledge and Understanding
Learning,
Communication



2. Analyse the requirements and synthesise a design using IoT technologies

Analysis



3. Design, implement, evaluate and critically analyse the vulnerability assessment of complex IoT systems and recommend countermeasures

Problem Solving,
Application,
Reflection



4. Critically analyse and evaluate key security architectures and authentication schemas.

Analysis,
Problem Solving,
Knowledge and Understanding

TEXTS
IoT Security by Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila. Publisher: Wiley, 2020

Practical Internet of Things Security by Brian Russell, Drew Van Duren. Publisher: Packt Publishing Release, 2018

IoT for Beginners: Explore IoT Architecture, Working Principles, IoT Devices, and Various Real IoT Projects (English Edition): Explore IoT ... Various Real IoT Projects (English Edition) by Vibha Soni, 2021

IoT based Projects: Realization with Raspberry Pi, NodeMCU and Arduino (English Edition), by¿Dr. Rajesh Singh,¿Dr. Anita Gehlot,¿Dr. Lovi Raj Gupta, BPB Publications, 2020
RESOURCES
Specialist Software and Hardware

Virtual Machine requirements
WEB DESCRIPTOR
In this module you will gain a solid technical introduction to the security protocols related to the Internet of Things (IoT). This module discusses the security-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. The module covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT.