DCU Home | Our Courses | Loop | Registry | Library | Search DCU
<< Back to Module List

Latest Module Specifications

Current Academic Year 2025 - 2026

Module Title Security for IoT & Edge Networks
Module Code EEN1059 (ITS: EE5001)
Faculty Electronic Engineering School Engineering & Computing
NFQ level 9 Credit Rating 7.5
Description

This module introduces students to cybersecurity technologies, algorithms and protocols for securing IoT and Edge Networks. It introduces symmetric cryptography algorithms for data confidentiality, asymmetric cryptography algorithms for key distribution and identity authentication, and hash functions for message authentication. In addition, the module describes different types of security attacks and countermeasures. The module also covers the mathematics fundamental to cryptographic algorithms and other technologies, including privacy protection, public key infrastructure (PKI), PKI-based authentication, programmable logic, encryption/decryption, and trusted hardware.

Learning Outcomes

1. Familiar with Internet security architecture and understand the security issues of IoT and edge networks at each network layer.
2. Understand the security threats of IoT and edge networks. Comprehensively explain the range of algorithms and protocols used to secure IoT and edge networks and the criteria for choosing the algorithms.
3. Demonstrate a working knowledge of the mathematics used in cryptology, allowing them to understand attacks on IoT and edge networks and how to prevent future security attacks.
4. Be able to implement appropriate cryptographic algorithms in either hardware or software for specific use cases.
5. Be able to critically analyse and evaluate the performance and vulnerability of crypto algorithms and protocols used in IoT and edge network security systems.


WorkloadFull time hours per semester
TypeHoursDescription
Lecture36In classroom or online
Assignment Completion60Programming, testing, report writing
Independent Study92Reading, understanding the details of the AES and RSA algorithms, reference searching, etc
Total Workload: 188
Section Breakdown
CRN20719Part of TermSemester 2
Coursework0%Examination Weight0%
Grade Scale40PASSPass Both ElementsY
Resit CategoryRC1Best MarkN
Module Co-ordinatorXiaojun WangModule Teacher
Section Breakdown
CRN21158Part of TermSemester 2
Coursework0%Examination Weight0%
Grade Scale40PASSPass Both ElementsY
Resit CategoryRC1Best MarkN
Module Co-ordinatorXiaojun WangModule Teacher
Section Breakdown
CRN12262Part of TermSemester 1
Coursework0%Examination Weight0%
Grade Scale40PASSPass Both ElementsY
Resit CategoryRC1Best MarkN
Module Co-ordinatorModule Teacher
Assessment Breakdown
TypeDescription% of totalAssessment Date
AssignmentReport on the program implementation, correctness validation, and performance analysis of Cryptographic algorithms.25%Week 4
Formal ExaminationEnd-of-Semester Examination75%End-of-Semester
Reassessment Requirement Type
Resit arrangements are explained by the following categories;
RC1: A resit is available for both* components of the module.
RC2: No resit is available for a 100% coursework module.
RC3: No resit is available for the coursework component where there is a coursework and summative examination element.

* ‘Both’ is used in the context of the module having a coursework/summative examination split; where the module is 100% coursework, there will also be a resit of the assessment

Pre-requisite None
Co-requisite None
Compatibles None
Incompatibles None

All module information is indicative and subject to change. For further information,students are advised to refer to the University's Marks and Standards and Programme Specific Regulations at: http://www.dcu.ie/registry/examinations/index.shtml

Indicative Content and Learning Activities

Introduction to IoT and edge network security
Understand the concepts and characteristics of IoT and edge networks, understand the architecture security threats of IoT and edge networks, and familiarise the primary means for ensuring IoT and edge networks.

Security Systems for IoT and edge networks
Understand the hierarchical structure of IoT and edge networks and the security issues at each level. Introduction to the security architecture of the Internet, Perception layer security, Network layer security and Application layer security, information security and privacy protection.

Cryptography Algorithms
Introduce to abstract algebra and finite fields, the mathematics used in cryptology. Introduction to pseudorandom number generators. Stream cypher and block cypher, DES, Triple DES, AES, algorithms, block cypher mode of operation. Introduction to RSA algorithm, key management, hash function and message digest, digital signature, lightweight encryption algorithms for IoT and edge networks.

Privacy and Security
Understand the connection and difference between privacy and information security, personal information privacy protection, and data sharing protection methods.

Access Security
IoT and edge network access security, trust management, identity authentication, access control, public key infrastructure

System Security
Understand the concept of network and system security, malicious attacks, intrusion detection and prevention, firewall principles, the principle of virus cleaning, and network security protocols.

Wireless Network Security
Understand wireless network security threats, WiFi security technology, ZigBee security technology, and Bluetooth security technology.

Indicative Reading List

Books:
  • William Stallings: 2019, Cryptography and Network Security Pearson Etext Access Card, 8th Edition, Pearson, 9780135764039
  • Niels Ferguson, Bruce Schneier and Tadayoshi Kohno: 2011, Cryptography Engineering: Design Principles and Practical Applications, Wiley, 0470474246
  • Jean-Philippe Aumasson: 2017, Serious Cryptography: A Practical Introduction to Modern Encryption, No Starch Press, 1593278268


Articles:
None
Other Resources

  • 1: eBook, 2020, IoT Security: Advances in Authentication, John Wiley & Sons Ltd

<< Back to Module List View 2024/25 Module Record for EE5001