TEK5530 - Measurable Security for the Internet of Things
From its-wiki.no
Revision as of 19:30, 23 November 2015 by Josef.Noll (Talk | contribs)
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
TEK5530 - Measurable Security for the Internet of Things
TEK5530 | |
---|---|
News | Lectures on Fridays 0900-1200h, starting from 23Jan2016. The course is given at UNIK (Room 308b), with video communication to Room Scheme@Ifi.UiO.no (1251) |
Organisation | UNIK |
by | Josef Noll, György Kálmán |
Keywords |
---|
Abstract | The course provides a methodology for measurable security, privacy, and dependability of industrial systems. Based on e.g. a smart grid example we will establish and develop the methodology to perform a multi-metrics analysis from components to sub-systems to systems. The course will allow you to compare security-related application goals with the results from the system analysis. |
---|---|
Objective (max 350 words) | After completing the course you will be able to:
|
Keywords | Security, Network Security, Sensor Security, Sensor networks |
Research Area(s) | Security |
Type of course | Master |
Upload TEK5530.png to see a course picture instead of the banner picture. Edit the page by Special:FormEdit/Course/TEK5530.
To add new lectures, use: Add a lecture
Info
- This course is a Master course.
- The course takes place on Fridays, 0900-1200h at UNIK. A video communication is available to Ifi, Room Scheme@Ifi.UiO.no (room 1251), see check: Video_conference
- We'll have video streaming: mms://lux.unik.no/308
- Evaluation is based on a presentation of topics and the implementation of your scenario.
Topics
The course has the following parts
Introduction into Internet of Things (IoT)
This first part will provide the ...
- Provide industrial examples, e.g. Smart Grid and automatic meter readings
Machine-readable Security Description
- Describing Security and Security Functionality in a semantic way
Application-driven security goals
- Establish application-driven security goals as well as the semantics of your system
Perform Mulit-Metrics Analysis
- Generate matrices to describe the security impact of components and sub-systems, and perform a multi-metrics analysis to establish the system security
- Analyze application goal versus system security and suggest improvements