DCU Home | Our Courses | Loop | Registry | Library | Search DCU
<< Back to Module List

Module Specifications.

Current Academic Year 2024 - 2025

All Module information is indicative, and this portal is an interim interface pending the full upgrade of Coursebuilder and subsequent integration to the new DCU Student Information System (DCU Key).

As such, this is a point in time view of data which will be refreshed periodically. Some fields/data may not yet be available pending the completion of the full Coursebuilder upgrade and integration project. We will post status updates as they become available. Thank you for your patience and understanding.

Date posted: September 2024

Module Title Security for IoT & Edge Networks
Module Code EE5001 (ITS) / EEN1059 (Banner)
Faculty Engineering & Computing School Electronic Engineering
Module Co-ordinatorXiaojun Wang
Module Teachers-
NFQ level 9 Credit Rating 7.5
Pre-requisite Not Available
Co-requisite Not Available
Compatibles Not Available
Incompatibles Not Available
Repeat examination
Reassessment is available for both CA and exam.
Description

This module introduces students to cybersecurity technologies, algorithms and protocols for securing IoT and Edge Networks. It introduces symmetric cryptography algorithms for data confidentiality, asymmetric cryptography algorithms for key distribution and identity authentication, and hash functions for message authentication. In addition, the module describes different types of security attacks and countermeasures. The module also covers the mathematics fundamental to cryptographic algorithms and other technologies, including privacy protection, public key infrastructure (PKI), PKI-based authentication, programmable logic, encryption/decryption, and trusted hardware.

Learning Outcomes

1. Familiar with Internet security architecture and understand the security issues of IoT and edge networks at each network layer.
2. Understand the security threats of IoT and edge networks. Comprehensively explain the range of algorithms and protocols used to secure IoT and edge networks and the criteria for choosing the algorithms.
3. Demonstrate a working knowledge of the mathematics used in cryptology, allowing them to understand attacks on IoT and edge networks and how to prevent future security attacks.
4. Be able to implement appropriate cryptographic algorithms in either hardware or software for specific use cases.
5. Be able to critically analyse and evaluate the performance and vulnerability of crypto algorithms and protocols used in IoT and edge network security systems.



Workload Full-time hours per semester
Type Hours Description
Lecture36In classroom or online
Assignment Completion60Programming, testing, report writing
Independent Study92Reading, understanding the details of the AES and RSA algorithms, reference searching, etc
Total Workload: 188

All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml

Indicative Content and Learning Activities

Introduction to IoT and edge network security
Understand the concepts and characteristics of IoT and edge networks, understand the architecture security threats of IoT and edge networks, and familiarise the primary means for ensuring IoT and edge networks.

Security Systems for IoT and edge networks
Understand the hierarchical structure of IoT and edge networks and the security issues at each level. Introduction to the security architecture of the Internet, Perception layer security, Network layer security and Application layer security, information security and privacy protection.

Cryptography Algorithms
Introduce to abstract algebra and finite fields, the mathematics used in cryptology. Introduction to pseudorandom number generators. Stream cypher and block cypher, DES, Triple DES, AES, algorithms, block cypher mode of operation. Introduction to RSA algorithm, key management, hash function and message digest, digital signature, lightweight encryption algorithms for IoT and edge networks.

Privacy and Security
Understand the connection and difference between privacy and information security, personal information privacy protection, and data sharing protection methods.

Access Security
IoT and edge network access security, trust management, identity authentication, access control, public key infrastructure

System Security
Understand the concept of network and system security, malicious attacks, intrusion detection and prevention, firewall principles, the principle of virus cleaning, and network security protocols.

Wireless Network Security
Understand wireless network security threats, WiFi security technology, ZigBee security technology, and Bluetooth security technology.

Assessment Breakdown
Continuous Assessment25% Examination Weight75%
Course Work Breakdown
TypeDescription% of totalAssessment Date
AssignmentReport on the program implementation, correctness validation, and performance analysis of Cryptographic algorithms.25%Week 4
Reassessment Requirement Type
Resit arrangements are explained by the following categories:
Resit category 1: A resit is available for both* components of the module.
Resit category 2: No resit is available for a 100% continuous assessment module.
Resit category 3: No resit is available for the continuous assessment component where there is a continuous assessment and examination element.
* ‘Both’ is used in the context of the module having a Continuous Assessment/Examination split; where the module is 100% continuous assessment, there will also be a resit of the assessment
This module is category 1
Indicative Reading List

  • William Stallings: 2019, Cryptography and Network Security Pearson Etext Access Card, 8th Edition, Pearson, 9780135764039
  • Niels Ferguson, Bruce Schneier and Tadayoshi Kohno: 2011, Cryptography Engineering: Design Principles and Practical Applications, Wiley, 0470474246
  • Jean-Philippe Aumasson: 2017, Serious Cryptography: A Practical Introduction to Modern Encryption, No Starch Press, 1593278268
Other Resources

64797, eBook, 2020, IoT Security: Advances in Authentication, John Wiley & Sons Ltd, https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978,

<< Back to Module List