1st year     2nd year     3rd year     4th year    



B.Tech. IV (CO) Semester - 7 (ELECTIVE - I)

L

T

P

C

CO421: Security In Resources Constrained Environments And IOT (ELECTIVE - I)

3

1

0

4

COURSE CONTENT

1. Introduction to Embedded Security & discussion of the syllabus, study materials, Review of Security Basics, Services & Mechanisms, Security Requirements in Embedded Systems. Design Challenges in Security for Embedded Systems, Security Gap, Typical Generic Security Threats in Embedded Systems.

2. Introduction to Wireless Sensor Networks as Embedded Systems, evolution of Human Computer Interfaces, Ubiquitous computing, Pervasive Computing, The illustrative sensor motes, typical configurations, Deployment models and issues, typical applications.

3. The motivation for the Security Issues, Security in Wireless Sensor Networks, Typical Attacks and Countermeasures. The Denial of Service Attacks on Wireless Sensor Networks.

4. Handson on the TinyOS operating environemnt, the nesC programming language. The TOSSIM simulator. The Avrora Emulator. The TinySec environment and its files. Handson on Contiki Cooja simulator.

5. Motivation for Secure Data Aggregation in Wireless Sensor Networks. End-to-end and Hop-by-hop Secure Data Aggregation. Issues.

6. The Design of a Hop-by-hop Link Layer Security protocol in Wireless Sensor Networks. Design Issues viz. Security Issues, Performance Issues, Ciphers, Initialization Vector, Message Authentication Code, Authenticated Encryption Modes. Investigating Replay attacks in Link Layer Security Architectures and typical mitigation approaches. The Replay Protection Algorithms continued. Flexibly Configurable Link Layer Security Architecture for Wireless Sensor Networks.

(21 + 7 Hours)

7. The End-to-End Secure Data Aggregation in Wireless Sensor Networks. The concept of Fully Homomorphic Encryption.Using the Classical Homomorphic Encryption algorithms for privacy in WSNs. Different approaches to offer data integrity viz. using conventional MAC - Aggregate MAC, Homomorphic MAC Hybrid Secure Data Aggregation. Malleability Resilient Concealed Data Aggregation.

8. Ciphers in the resource constrained devices. Lightweight Ciphers for RFID Devices. The AES Cipher working and Demo in WSNs. Assignment on AES Encryption Decryption routines. The TEA Cipher operation, Demo of Executing RC5 and XXTEA ciphers in TinySec environment. Case study of the ciphers – representative ciphers from the list viz. TEA, XXTEA, RC5, miniAES, PRESENT, Simon, Speck – their Encryption, Decryption and Key Management Routines. Doing hand computation of the intermediate ciphertext at each stage in all these ciphers.

9. Public Key Infrastructure in Wireless Sensor Networks, The TinyPK protocol as a case study. Attribute Based Encryption and its motivation for Embedded Systems.

10. The Internet of Things. Architecture. Constituent Elements. The Security and Privacy Issues in IoT Systems. Overview of the IoT Protocols viz. Continua for Home Health Devices, DDS, DPWS: WS-Discovery-SOAP-WSAddressing-WDSL-XML Schema, HTTP/REST, MQTT, UPnP, XMPP, ZeroMQ. The IoT Security Protocols viz. ZigBee, Bluetooth, 6LowPAN, RPL. The CoAP.

11. Introduction to the Side channel attacks in embedded systems: Side channel attacks, passive versus active attacks, timing, analysis, power analysis, electromagnetic analysis, analysis tools and equipment.

12. Overview of Security Support in Data protection protocols for the Embedded Systems. SSL, IPSec, IKE, and TLS in Resource constrained devices.

(21 + 7 Hours)

(Total Contact Time: 42 Hours + 14 Hours = 56 Hours)

BOOKS RECOMMENDED

  1. Security and Privacy in Internet of Things (IOT's): Models, Algorithms and Implementations Handcover by Fei Hu. CRC Press, April 2016.
  2. Research Papers Prescribed in Class.