INDICATIVE CONTENT
This module covers topics of:
What is the Internet of Things
Networkable hardware sensors and smart devices
Health & Safety
Security issues in hardware, IoT and Smart devices
Cyber-attacks in an IoT world
Analysis and problem solving approaches
Requirements analysis and specification
Low level design techniques
Students will use a range of physical build micro-controller products and interface kit and programming environments
The module is designed to be practical with one-one support through a range of tutorials which enables the student to develop full deep learning and apply their skills to physical devices as they will encounter within industry. E.g. To design, program, adapt and commission a real time system.
ADDITIONAL ASSESSMENT DETAILS
Documentation - The production of designs and documentation to propose solutions to a commercial scenario based problem. The assessment enables the student to apply and relate their skills learnt within the module to produce a secure commercial IOT solution fit for industry from a given MoSCoW requirement document using a variety of hardware and IoT devices (Learning Outcomes 1 to 4).
Presentation – The design document will be presented to emphasise the solution and the students approaches taken (Learning Outcome 3).
LEARNING OUTCOMES
1. UNDERTAKE A SYSTEMATIC REVIEW OF HARDWARE AND IOT DEVICES FROM A SECURITY PERSPECTIVE
Knowledge and Understanding,
Application
2. EXTEND YOUR PROBLEM-SOLVING SKILLS TO PRODUCE SECURE SOLUTIONS FOR INDUSTRIAL CONTEXTS
Problem Solving,
Analysis
3. APPLY SKILLS TO AREAS OF COMPUTING THAT ENHANCE YOUR COMMUNICATION SKILLS IN THE FORM OF COMMERCIAL DOCUMENTATION AND PRESENTATION
Application,
Communication
4. APPLY AND USE LOW-LEVEL TECHNIQUES TO INGRATE DEVICES INTO NETWORKED ENVIRONMENTS
Application, Problem Solving
LEARNING STRATEGIES
All teaching sessions will blend theory and practical learning. Students will be introduced to curriculum concepts and ideas and will then be able to apply theory to practical examples within the same sessions. In addition, students will be provided with a range of resources for independent study such as case studies, academic papers and industry stories. There will be a mixture of practical and theoretical formative (mock or practice) exercises which will help students build knowledge and confidence in preparation for summative (formal) assessment.
RESOURCES
Micro-controller modules and interface boards
Standard windows PC with software to run cross compiler
REFERENCE TEXTS
All texts and electronic resources will be updated and refreshed on an annual basis and available for students via the online Study Links resource platform. All reference materials will be collated and curated and aligned to Equality, Diversity & Inclusion indicators.
Song, H. (2022), Internet Of Everything: Key Technologies, Practical Applications And Security Of IoT, World Scientific Publishing Co Pte Lt
Lele, C. (2022), Internet of Things (IoT) A Quick Start Guide: A to Z of IoT Essentials (English Edition), BPB Publications
Herreo, C. (2022), Fundamentals of IoT Communication Technologies (Textbooks in Telecommunication Engineering), Springer; 1st ed. 2022 edition¿
Fattahi, A. (2022), IoT Product Design and Development: Best Practices for Industrial, Consumer, and Business Applications (IoT Skills in Practice), Wiley-Blackwell
Barnet, P. et. Al. (2020), Intelligent Automation: Learn how to harness Artificial Intelligence to boost business & make our world more human
Tounsi, W. ed., (2019), Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT, John Wiley & Sons.
Bhattacharjee, S., (2018), Practical Industrial Internet of Things security: A practitioner's guide to securing connected industries. Packt Publishing Ltd.
Russell, B. and Van Duren, D., (2016), Practical internet of things security. Packt Publishing Ltd.
WEB DESCRIPTOR
This module enables you to apply your skills in analysing devices as used in IoT systems to a typical industrial graduate project scenario. You will use turn-key products to rapidly design and deploy a secure solution and document this through sound paper based techniques. You will also present your solution in order to show the design and provide the rationale as to how you got to your final design solution.