TEK5530 - Measurable Security for the Internet of Things
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
TEK5530 - Measurable Security for the Internet of Things
TEK5530 | |
---|---|
News | Lectures on Thursdays 0900-1200h, starting from 21Jan2016. The course is given at UNIK (Room 401), with video communication to Room Scheme@Ifi.UiO.no (1251) |
Organisation | UNIK |
by | Josef Noll, György Kálmán |
Keywords |
---|
Abstract | The course provides a methodology for measurable security, privacy, and dependability of industrial systems. Based on e.g. a smart grid example we will establish and develop the methodology to perform a multi-metrics analysis from components to sub-systems to systems. The course will allow you to compare security-related application goals with the results from the system analysis. |
---|---|
Objective (max 350 words) | After completing the course you will be able to:
|
Keywords | Security, Network Security, Sensor Security, Sensor networks |
Research Area(s) | Security |
Type of course | Master |
Upload TEK5530.png to see a course picture instead of the banner picture. Edit the page by Special:FormEdit/Course/TEK5530.
To add new lectures, use: Add a lecture
Info
- This course is a Master course. Please visit UNIK9750 for the PhD version of the course.
- The course takes place on Thursdays, 0900-1200h at UNIK. A video communication is available to Ifi, Room Scheme@Ifi.UiO.no (room 1251), see check: Video_conference
- We'll have video streaming: mms://lux.unik.no/401
- Evaluation is based on a presentation of topics and the implementation of your scenario.
Lectures in UNIK4750
21Jan - L1: Introduction G,J - Handouts Media:UNIK4750-L1-Introduction.pdf
- Lecture Notes Media:UNIK4750-L1-LectureNotes.pdf
- Podcast (Audio): Download lecture 1
- Video Podcast: Lecture 1 NB! If you are using Mac and have problem playing the video please first disable your firewall!
28Jan - L2: Internet of Things J - Handouts Media:UNIK4750-L2-Internet_of_Things.pdf
- Video introduction: IBM introduction to IoT, TED talk of John Barrett
- Internet of Things Paper (.pdf)
- Lecture Notes Media:UNIK4750-L2-LectureNotes.pdf
- Podcast (Audio - first 30 minutes): Download lecture 2
- Video Podcast: Lecture 2
4Feb - L3: Security in IoT G - Paper selection - Handouts Media:UNIK4750-L3-Security_IoT.pdf
- UNIK4750/List of papers, Guide on how to search for Literature
- Devon conference paper (.pdf)
- no lecture notes
- Video Podcast: mms://lux.unik.no/UNIK4750-GK/UNIK-20160204.wmv
11Feb - L4: Smart Grid, Automatic Meter Readings (AMR) G - Handouts Media:UNIK4750-L4-Automatic_Meter_Readings.pdf
- Video Podcast: mms://lux.unik.no/UNIK4750-GK/UNIK-20160211.wmv
18Feb - L5: Service implications on functional requirements G,(J) - Handouts Media:UNIK4750-L5-Service_Implications.pdf
- Podcast (Audio): Download lecture 5
- Video Podcast: mms://lux.unik.no/UNIK4750-GK/UNIK-20160218.wmv Unfortunately due to technical problems the first half of the lecture is not recorded but you can use this link to download an audio file which covers the whole lecture.
25Feb - vinterferie
3Mar - L6: Technology mapping G,(J) - Handouts Media:UNIK4750-L6-Technology_mapping.pdf,
- Video Podcast: mms://lux.unik.no/UNIK4750-GK/UNIK-20160303.wmv
- Paper: 10 differences between ICS and IT systems
- Paper: Practical applications of Lightweight Block Ciphers to Secure EtherNet/IP Networks
- Video Podcast: mms://lux.unik.no/UNIK4750-GK/UNIK-20160303.wmv
10Mar - L7: UNIK4750 Paper analysis with 15-20 min presentation, evaluation criteria
17Mar - L8: Security Semantics J - Handouts Media:UNIK4750-L8-Security_Semantics.pdf
- Lecture Notes Media:UNIK4750-L8-LectureNotes.pdf
- Video Podcast: mms://lux.unik.no/UNIK4750-GK/UNIK-20160317.wmv
24Mar - Easter Holidays
31Mar - L9: Logical binding - industrial example J, Guest lecturer: Mushfiq Chowdhury - Handouts: Media:UNIK4750-L9-handouts.pdf
- Media:20160331-L9-Lecture_notes.pdf Lecture notes
- Video Podcast: mms://lux.unik.no/UNIK4750-GK/UNIK-20160331.wmv
- Media:2016031-Project-Ideas.pdf - Information on your Project
7Apr - L10: Multi-Metrics Method for measurable Security J - Handouts Media:UNIK4750-L10-Multi-Metrics.pdf,
- last slides from Security Semantics: Media:UNIK4750-L8-Security_Semantics.pdf
- Paper describing the approach: Multi Metrics Approach for Embedded Systems (.pdf on Research Gate)
- Media:20160407-L10-Lecture_notes.pdf Lecture notes
- Video Podcast: mms://lux.unik.no/UNIK4750-GK/UNIK-20160407.wmv
14Apr - L11: Multi-Metrics Weighting of an AMR sub-system J - Handouts L11 Media:UNIK4750-L11-AMR-weight.pdf
- Paper describing the approach: Multi Metrics Approach for Smart Grids
- Media:20160414-L11-Lecture_notes.pdf Lecture notes
21Apr - L12: System Security and Privacy analysis J - Handouts L12 Media:UNIK4750-L12-Security-Privacy_classes.pdf
- Media:20160421-L12-Lecture_notes.pdf Lecture notes
28Apr - L13: Phenomena "intrusion-detection" - G
5May - Kristi Himmelfart - fridag
12May - L14: Real world examples - IoTSec infrastructure J
19May - L15: Real world IoT service evaluation; UNIK4750 presentation of your Group Work - (suggestions and criteria)
26May - time for exam preparation (no lecture)
Thursday 2Jun or Wednesday 8Jun - Exam G,J - we'll ask for your preferred date
Introduction into Internet of Things (IoT)
This first part will provide the introduction into the Internet of Things (Lecture 1 - L2), with industrial examples
- Smart Grid and automatic meter system (AMS)
- Smart Homes with sensors
- Wireless System upgrade of cars
The part will further address potential security threats (L3), here given for the future smart grid.
When the future Smart Grid consists of Prosumers (Consumers, who might also be Producers) with different energy sources, the grid will become more unstable. We will use an example of an automatic meter reading (AMR) and -system (AMS) in L4 to address the security and privacy challenges.
The final part of this first block is addressed through lectures L5 and L6, and will create the mapping from functional requirements towards mapping into technology. Examples of such mapping are the translation of privacy requirements - can somebody see from my meter reading if I'm at home - towards technology parameters like how often are values read and published.
Machine-readable Descriptions
The next block deals with the machine-readable description of security and privacy, security functionality and system of systems through ontologies.
- Establish system description examples of systems,
- Describing Security and Security Functionality in a semantic way
Application-driven security goals
This block will develop the security goals resulting from applications.
- From industrial examples, establish the functional requirements. Example: switch-off time of power circuits less than 10 ms
- From the functional requirements, select the security and privacy relations
- Establish application-driven security goals as well as the semantics of your system
Perform Multi-Metrics Analysis
This last block will analyse industrial examples based on the multi-metrics analysis.
- Generate matrices to describe the security impact of components and sub-systems, and perform a multi-metrics analysis to establish the system security
- Analyze application goal versus system security and suggest improvements
Lecture overview with keywords
this section is automatically filled in based on the information on this MediaWiki