Module Specifications.
Current Academic Year 2024 - 2025
All Module information is indicative, and this portal is an interim interface pending the full upgrade of Coursebuilder and subsequent integration to the new DCU Student Information System (DCU Key).
As such, this is a point in time view of data which will be refreshed periodically. Some fields/data may not yet be available pending the completion of the full Coursebuilder upgrade and integration project. We will post status updates as they become available. Thank you for your patience and understanding.
Date posted: September 2024
| |||||||||||||||||||||||||||||||||||||||||||
Repeat examination Reassessment is available for both CA and exam. |
|||||||||||||||||||||||||||||||||||||||||||
Description This module introduces students to cybersecurity technologies, algorithms and protocols for securing IoT and Edge Networks. It introduces symmetric cryptography algorithms for data confidentiality, asymmetric cryptography algorithms for key distribution and identity authentication, and hash functions for message authentication. In addition, the module describes different types of security attacks and countermeasures. The module also covers the mathematics fundamental to cryptographic algorithms and other technologies, including privacy protection, public key infrastructure (PKI), PKI-based authentication, programmable logic, encryption/decryption, and trusted hardware. | |||||||||||||||||||||||||||||||||||||||||||
Learning Outcomes 1. Familiar with Internet security architecture and understand the security issues of IoT and edge networks at each network layer. 2. Understand the security threats of IoT and edge networks. Comprehensively explain the range of algorithms and protocols used to secure IoT and edge networks and the criteria for choosing the algorithms. 3. Demonstrate a working knowledge of the mathematics used in cryptology, allowing them to understand attacks on IoT and edge networks and how to prevent future security attacks. 4. Be able to implement appropriate cryptographic algorithms in either hardware or software for specific use cases. 5. Be able to critically analyse and evaluate the performance and vulnerability of crypto algorithms and protocols used in IoT and edge network security systems. | |||||||||||||||||||||||||||||||||||||||||||
All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml |
|||||||||||||||||||||||||||||||||||||||||||
Indicative Content and Learning Activities
Introduction to IoT and edge network securityUnderstand the concepts and characteristics of IoT and edge networks, understand the architecture security threats of IoT and edge networks, and familiarise the primary means for ensuring IoT and edge networks.Security Systems for IoT and edge networksUnderstand the hierarchical structure of IoT and edge networks and the security issues at each level. Introduction to the security architecture of the Internet, Perception layer security, Network layer security and Application layer security, information security and privacy protection.Cryptography AlgorithmsIntroduce to abstract algebra and finite fields, the mathematics used in cryptology. Introduction to pseudorandom number generators. Stream cypher and block cypher, DES, Triple DES, AES, algorithms, block cypher mode of operation. Introduction to RSA algorithm, key management, hash function and message digest, digital signature, lightweight encryption algorithms for IoT and edge networks.Privacy and SecurityUnderstand the connection and difference between privacy and information security, personal information privacy protection, and data sharing protection methods.Access SecurityIoT and edge network access security, trust management, identity authentication, access control, public key infrastructureSystem SecurityUnderstand the concept of network and system security, malicious attacks, intrusion detection and prevention, firewall principles, the principle of virus cleaning, and network security protocols.Wireless Network SecurityUnderstand wireless network security threats, WiFi security technology, ZigBee security technology, and Bluetooth security technology. | |||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||
Indicative Reading List
| |||||||||||||||||||||||||||||||||||||||||||
Other Resources 64797, eBook, 2020, IoT Security: Advances in Authentication, John Wiley & Sons Ltd, https://onlinelibrary.wiley.com/doi/book/10.1002/9781119527978, | |||||||||||||||||||||||||||||||||||||||||||