The course is connected to the following study programs

Teaching language

Norwegian

Recommended prerequisites

IKT447-G Trust, Threats, Risk and Vulnerability, or the equivalent.

In addition, it is advantageous to have knowledge in Python programming and Linux.

Course contents

The main topics in the course are:

- IoT concepts and architectures

- Critical ICT infrastructures aspects

- Security and privacy aspects for IoT

- MQTT Protocol and the associated service architecture

- Overview of other IoT Protocols and security

- Machine-Type Communication (MTC), based on 3GPP specifications
- Massive MTC
- Critical MTC (also known as ultra-reliable low-latency communication (urllc))

- Overview of MTC security

- Design, configuration and implementation of simple MQTT-based IoT systems using OpenSSL, Mosquitto server and Paho programming libraries

Learning outcomes

On successful completion of the course, the students should:

- know about selected Internet-of-Things (IoT) architectures

- have a solid theoretical understanding of IoT related security and privacy issues and be able to apply this knowledge in simple systems

- have a deep theoretical and practical knowledge of the MQTT protocol

- have knowledge on security aspects of IoT protocols

- be able to design and implement a simple and secure IoT system using the MQTT protocol

- have an overall understanding on the social perspectives of IoT security

- have knowledge of Machine-Type Communication (MTC) concepts (IMT 2020 and Beyond)

- have a basic understanding of security perspectives associated with MTC

Examination requirements

Approved compulsory hand-ins and presentations. Information about compulsory assignments will be given in Canvas at the start of the semester.

Teaching methods

The course includes lectures, exercises and compulsory group work. The total expected workload for an average student is approximately 210 hours.

Evaluation

The person responsible for the course decides, in cooperation with student representative, the form of student evaluation and whether the course is to have a midway or end of course evaluation in accordance with the quality system for education, chapter 4.1.

Offered as Single Standing Module

Yes. Subject to availability or capacity.

Admission Requirement if given as Single Standing Module

Admission requirements for the course are the same as for the master’s programme in Cyber Security, or the master’s programme in ICT.

Assessment methods and criteria

Written examination, 3 hours. Graded assessment.

Last updated from FS (Common Student System) July 18, 2024 1:47:00 AM