Security Services for the IoT
This website lists information for the 2021/2022 course Security Services for the IoT (SSI) at the University of Twente.
Last updated at 22 Jun 2022.
Welcome new students!
A very warm welcome to all students. Feel free to browse around for more information.
Overview
Course code | 201700083 |
Prerequisites | Network Security (ET4397IN) or Internet Security (192654000) or equivalent; good understanding of network systems |
Coordinator | Cristian Hesselman (SIDN Labs and University of Twente) (c.e.w.hesselman@utwente.nl) |
Credits | 5EC (140 hours) |
Lecturers | prof.dr. Cristian Hesselman (SIDN Labs and University of Twente) dr. Elmer Lastdrager (SIDN Labs) |
Teaching assistants | Ramin Yazdani (University of Twente) Etienne Khan (University of Twente) |
Academic year | 2021-2022 |
Quartile | 2B: 24 April to 8 July 2022 |
Language | English |
Enrollment and course updates
You can only sign up for SSI through OSIRIS, we do not accept registrations via email or other channels. We urge you to scan SSI’s list of papers before you sign up, so you know what to expect. If you nonetheless end up unsubscribing from SSI, then please unregister through OSIRIS/CANVAS. In this case, we appreciate it if you share your feedback as to why you unregistered with the SSI coordinator so we can use it to further improve SSI.
The latest schedule and other information are available through this webpage. The reason we use a separate public website for SSI in addition to Canvas is that we’d like to share SSI’s format with other universities and students so they can potentially learn from it. The second reason is that at SIDN Labs we’re proud of our contribution to courses like SSI, plus we’d like to underscore the importance of companies helping to educate the next generation of engineers and researchers, for instance in the area of IoT security. Finally, the UT is a public institution, which we believe means it should share its output with the Dutch society and beyond as much as possible.
Prerequisites
We expect you to have a good understanding of network systems, for example by having followed the Network Systems, Network Security (ET4397IN) and/or Internet Security (192654000) course. You may need to read up on your networking skills if you are unfamiliar with terms and tools such as Wireshark, pcap files and tcpdump.
For the lab assignment, each group of 2-3 students needs to get their hands on at least two IoT devices.
Lectures
SSI lectures will focus on discussing two papers (see Schedule). The lectures will take only place physically at the UT. Please refer to the schedule to find the classrooms.
You will not need to take a test at the lectures. Instead, the goal of the lectures is to able you to learn from each other so as to be better prepared for the oral exam (see Assessment). This is also why attending the technical lectures is mandatory. We provide a re-sit lecture in case you miss a technical lecture, for example due to illness.
During the lecture, your teachers will present a few slides that summarize the papers and include a few questions. We will review the answers together and allow time for discussion. For each paper, the teachers will appoint a student at random to share their opinion on the paper, for example on the pros/cons of the solution, or its limitations.
Schedule
Table 2 shows SSI’s schedule, which consists of a total of 9 lectures: an introduction and guest lecture, 2 more guest lectures, and 6 technical lectures. Both guest lectures will be open to everyone. There will be a small coffee break.
We also offer a “re-sit” on Wednesday 22 June in case you missed one of the technical lectures. The re-sit will follow the same format as the regular technical lectures.
Upon request, we can also provide a Q&A slot to help you with the SSI lab assignment following one of the lectures.
Lecture | Date | Contents |
---|---|---|
1 | April 26 10:45-12:30 OH 116 |
Course Introduction (30 minutes) Lecturer: Elmer Lastdrager - SSI assessment, schedule, and background. - Admin matters, such as signing up for the lab assignment Lecture slides (pdf) Guest lecture #1: IoT & SPIN Lecturer: Elmer Lastdrager (SIDN Labs) Lecture slides (pdf) |
2 | May 11 10:45-12:30 VR 583 |
Lecture: IoT Security Risks and Challenges Papers: [IoTSurvey] [DNSIoT] Lecturer: Ramin Yazdani and Cristian Hesselman Lecture slides (pdf) |
3 | May 18 10:45-12:30 VR 583 |
Lecture: IoT Botnet Measurements Papers: [Mirai] [Hajime] Lecturer: Elmer Lastdrager and Etienne Khan Plus a few minutes to get your feedback on the course so far Lecture slides (pdf) |
4 | May 24 10:45-12:30 CR 3B |
Guest lecture #2 Intro to cyber-physical systems Lecturer: Jeroen Gaiser MSc CISSP (Rijkswaterstaat, Ministry of Infrastructure and Water Management) Lecture slides are on Canvas. The guest lecture is open to everyone Hosts: Elmer Lastdrager and Cristian Hesselman |
5 | May 25 10:45-12:30 VR 583 |
Lecture: IoT Malware Analysis Papers: [RIoTMAN] [OpenForHire] Lecturer: Cristian Hesselman and Elmer Lastdrager Lecture slides (pdf) |
6 | Jun 1 10:45-12:30 VR 583 |
Lecture: IoT Edge Security Systems Papers: [ARA] [DBolt] Lecturer: Ramin Yazdani and Cristian Hesselman Plus a few minutes to get your feedback on the course so far Lecture slides (pdf) |
7 | Jun 8 10:45-12:30 VR 583 |
Lecture: IoT Device Security Papers: [IoTLS] [Haystack] Lecturer: Etienne Khan and Elmer Lastdrager Lecture slides (pdf) |
8 | Jun 14 10:45-12:30 Online & HB 2F |
Guest lecture #3: Strengthening the IoT Ecosystem: Privacy Preserving IoT Security Management Lecturer: Dr Anna Maria Mandalari (Imperial College London) Abstract: We are seeing an increasingly abundance of potentially intrusive and privacy-invasive IoT devices in our lives, from smart city projects to the connected home. In this talk, I will explore my research vision towards building an IoT user-centered ecosystem which is privacy-aware, secure, efficient, and reliable. The guest lecture is open to everyone Hosts: Ramin Yazdani and Elmer Lastdrager |
9 | Jun 16 13:45-15:30 CR 3A |
Lecture: IoT Security in Non-Carpeted Areas Papers: [Lora] [Traffic] Lecturer: Cristian Hesselman and Ramin Yazdani Lecture slides (pdf) |
re-sit | Jun 22 10:45-12:30 VR 583 |
Lecture: IoT Honeypots (re-sit) Papers: [IoTPot] [Honware] Lecturer: Elmer Lastdrager and Etienne Khan Lecture slides (pdf) |
The last regular lecture (number 9, June 15) will also involve a 10-minute discussion to get your feedback on SSI, in addition to the official survey that the UT’s Quality Assurance folks will distribute.
Assessment
We asses to what extent you attained SSI’s learning outcomes (see Background) based on a total of 12 papers and IETF RFCs you will need to study and a lab assignment you will need to carry out.
Your individual assessment will be based on your deliverables for SSI, which are:
- Summaries for every discussed paper. You’ll need to hand in two summaries before every lecture (7AM). We do not grade the actual contents, only that you submitted them.
- An oral exam on the SSI papers/RFCs, to be conducted in-person in the last two weeks of Q4 (June 27 - July 8). The exam will cover all of the SSI papers and you can use your summaries of these papers in the exam.
- A lab report of at most 5 pages, to be carried out in groups of 2-3, depending on the number of participants.
To pass SSI, your score will need to be 5.5 or higher, which we calculate as follows:
total score = [ (score of oral exam) × 50% + (score of the lab assignment) × 50% ] × (all paper summaries submitted 0=no or 1=yes)
Where the total score is between 1 (worst) and 10 (best).
We will not evaluate the third learning goal (operational business of DNS operators), which serves as a bonus to help you understand how the Internet works operationally.
Deliverables and submission
Your first deliverable consists of a set of 12 paper summaries, one for each of the papers we’ll discuss during the lectures. Each summary can be at most 250 words. You can add figures and graphs from the paper or add your own if you like, but everything has to fit on a single-sided A4 paper. Please submit the summaries through Canvas latest 7AM on the day of the lecture in which the papers will be discussed.
Your second deliverable is the lab report (see Lab Assignment). Please submit it in PDF along with your network measurements (PCAP files, MUD files, and README files) through the SSI site on Canvas, following the submission guidelines described below. The firm deadline is Sunday June 26, 2022, 23:59 CEST.
Oral Exam
The oral exam consists of an in-person Q&A with an SSI teacher and a Teaching Assistant as observer. It will focus on the 12 papers you studied. We will only discuss the papers of Lecture 3 at a basic level, and go for a more in-depth discussion for the other papers.
The exam takes about 45 minutes and will take place in the Q4 exam weeks (June 27 through July 8). You will be able to pick a time slot for the oral exam in the week before the exams start.
Your input for the oral exam consists of the summaries you wrote for each of the papers, which you can use during the exam. We do not grade the summaries themselves, they are just for your reference during the oral exam.
We’ll take your oral exam in-person at the UT. On June 23rd, the locations are CR 3H and CR 3C. On July 1st, the oral exams are held online on Canvas. On July 8th, the oral exams are in VR 212.
During the oral exam, you will be evaluated by two members of the teaching staff (the reviewers). Both will individually assess you. The grading consists of four components:
- Context: how well you explained the context of a paper, such as the motivation of the work and why it is useful.
- Understanding: to what level you can explain the technical content of the paper. This goes further than basic reproducing of the paper.
- Relations amongst papers: the extent to which you are able to compare two papers with each other regarding their key differences.
- Analysis: how well you are able to identify and motivate weak/strong points and are able to have a critical look at the paper, beyond everything the authors write (i.e., to what extend could you review this paper critically).
Afterwards, both reviewers will discuss your performance and finalize their grades. The average grade of both reviewers will be your final grade for the oral exam.
Lab Assignment
You will need to carry out a lab assignment in teams of two to four, depending on the number of SSI participants. At the first lecture, we’ll inform you of the exact number of participants per team. We’ll create the groups on Canvas after the first lecture. There are two options for each group to do a lab assignment: either a design-based assignment (only after our approval) or a measurement-based assignment (the default option).
This year, we offer groups the option to do a design-based assignment in which you will design a system to improve IoT security or privacy, and implement a prototype of your system. You will then write a paper detailing your implementation. Your system must be able to run on low-end hardware, such as the SPIN device. If you want to do a design-based assignment, you need to have our approval before you can start. Please contact us for a meeting to discuss your plans. The remainder of this section will assume a measurement-based assignment.
The goal of the measurement-based lab assignment is for you to gain hands-on experience with measuring and analyzing the network behavior of IoT devices and capturing this behavior in a device profile. In SSI, we’ll be using the Manufacturer Usage Description (MUD) standard [RFC8520,mud] for this purpose. The measurements will enable you to learn how an IoT device behaves on the network, for instance how it responds to external triggers and what services on the Internet it uses. MUD is an easy to understand language standardized by the IETF in RFC 8520.
Please use open source tools like WireShark or TCPdump to carry out the traffic measurements. If you want, you may also use a SPIN device for this purpose. You can contact the Teaching Assistant if you need help with installing or using the tools.
Every group should analyze at least two IoT devices, which you will need to arrange yourselves. Please use IoT devices without a browser-like interface. Examples of suitable devices are light bulbs, audio speakers, doorbells, and light switches. The reason is that these types of devices interact with people’s physical world (e.g., by adjusting light levels), operate autonomously, and often a have a limited number of tasks, which is typical for IoT devices (see Background). Multi-purpose devices like tablets, on the other hand, focus on enabling human users to interact with content and services, which is typical for “traditional” Internet applications.
Your output for the lab assignment consists of a lab report of at most 5 pages (excluding references) in two-column IEEE format that discusses your methodology, the results of your measurements, your analysis and observations of both the measurements and the MUD specification, and your proposal on novel usages of MUD for IoT security or extensions of the MUD specification to describe the behavior you measured (an actual MUD spec). You may use text, graphs, and tables.
The lab report must be submitted as PDF file. As part of the report, you will also need to deliver your measurement results for each IoT device in the form of:
- a capture of its network traffic (e.g., using the SPIN traffic downloader [SPIN] or TCPdump),
- its MUD profile, and
- a README file with the IP and MAC addresses of the IoT device and gateway and an explanation of where in the PCAP you interacted with the device in what way (use the PCAPs’ timestamps).
The name of a PCAP file must be of the form <team-ID>-<device-name>.pcap
, MUD files <team-ID>-<device-name>.mud
, and README files of the form <team-ID>-README.txt
. If you decide to use mudgee, please include the ip flow information in your report (or as separate file <team-ID>-<device-name>.ipflow
). The team IDs are equal to your group number on Canvas.
We will evaluate your report based on SSI’s learning goals, as well as on the following criteria:
- Introduction/background: how well did you introduce your work, in particular your work’s context, purpose, and relevant references.
- Methodology: how well did you design and discuss the measurement setup and the procedures you used so others can reproduce your experiments.
- Results: how well did you explain and analyze the network interactions of the devices you analyzed.
- Discussion: how well did you discuss MUD’s pros/cons/extensions, the limitations of your measurements, critical analysis, and implications of the device’s security to the overall cyber security hygiene.
- Clarity: structure, language and readability of the report.
- Satisfies requirements regarding delivered pcap files, MUD, follows page limits (pass/fail).
During delivery on Canvas, your report will be checked for plagiarism automatically. As per the university’s policy, no forms of plagiarism are tolerated. This means that if you want to literally include sentences from other sources, you need to reference and quote them. This includes sources where you are an author (self-plagiarism). During the first lecture, we will briefly discuss the differences between citing, quoting, and copying. Please contact us if you have questions.
The lab report is evaluated as if it was a submitted paper to an academic conference. The report is considered a work of the entire group: everybody is equally responsible for the report. This means that your research has to be thorough in terms of methodology and description. An excellent 30 minute video on how to write a paper was made by Aiko Pras, so we highly recommend you watch it.
The teaching team will evaluate your report as follows. First, one of us takes all reports and blinds them, that is remove all names and references to group numbers. This ensures a double-blinded reviewing process (you don’t know who reviews your report; the reviewer does not know that you wrote it). We then divide the reports into two sets and assign two reviewers to each set. They use the criteria listed above to grade the report. Once all reports are reviewed, the reviewers cross-review a few papers in the other set of reports to make sure that we review your reports in a consistent way. Finally, we unblind the reports and process the grades.
Papers and RFCs
We’ll be using a total of 12 papers and IETF RFCs on IoT security for the technical lectures (not the guest lectures). Papers [RFC8520], [MUD] and [SPIN] are about SPIN and the Manufacturer Usage Description (MUD), which you’ll need for the lab assignment.
The goal of the papers in lecture 2 (which are not very technical) is to provide you with a broad view on the concept of the IoT in addition to the more specific solutions and analyses in the other lectures.
Lecture #2: IoT Concepts and Applications
[DNSIoT] C. Hesselman, M. Kaeo, L. Chapin, kc claffy, M. Seiden, D. McPherson, D. Piscitello, A. McConachie, T. April, J. Latour, and R. Rasmussen, “The DNS in IoT: Opportunities, Risks, and Challenges”, IEEE Internet Computing, 2020. https://www.sidnlabs.nl/downloads/49DguF5OpLVw5HCXfROdzW/9c7126fce8ddc80b0850d85f04d64139/The-DNS-in-IoT-Authors-Version-2020-SIDN-Labs.pdf
[IoTSurvey] N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum and N. Ghani, “Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations,” in IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2702-2733, 2019, https://dx.doi.org/10.1109/COMST.2019.2910750.
Lecture #3: IoT Botnet Measurements
[Mirai] M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher, C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou, “Understanding the Mirai Botnet”, in: 26th USENIX Security Symposium, 2017, https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-antonakakis.pdf
[Hajime] S. Herwig, K. Harvey, G. Hughey, R. Roberts, and D. Levin, “Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet”, Network and Distributed Systems Security (NDSS) Symposium 2019, San Diego, CA, USA, February 2019, https://www.ndss-symposium.org/ndss-paper/measurement-and-analysis-of-hajime-a-peer-to-peer-iot-botnet/
Lecture #5: IoT Malware Analysis
[RIoTMAN] A. Darki, and M. Faloutsos, “RIoTMAN: a systematic analysis of IoT malware behavior”, CoNEXT ’20: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, November 2020, https://doi.org/10.1145/3386367.3431317.
[OpenForHire] S. Srinivasa, J.M. Pedersen, E. Vasilomanolakis, “Open for hire: Attack trends and misconfiguration pitfalls of IoT devices”, 21st ACM Internet Measurement Conference (IMC 2021), November 2021, https://doi.org/10.1145/3487552.3487833.
Lecture #6: IoT Edge Security Systems
[DBolt] R. Ko and J. Mickens, “DeadBolt: Securing IoT Deployments”, Applied Networking Research Workshop, Montreal, QC, Canada, July 16, 2018 (ANRW ’18), https://mickens.seas.harvard.edu/files/mickens/files/deadbolt.pdf
[ARA] H. M. J. Almohri, L. T. Watson and D. Evans, “An Attack-Resilient Architecture for the Internet of Things,” in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3940-3954, 2020, https://doi.org/10.1109/TIFS.2020.2994777.
Lecture #7: IoT Device Security
[IoTLS] M.T. Paracha, D.J. Dubois, N. Vallina-Rodriguez, D. Choffnes, “IoTLS: understanding TLS usage in consumer IoT devices”, 21st ACM Internet Measurement Conference (IMC 2021), November 2021, https://doi.org/10.1145/3487552.3487830.
[Haystack] S.J. Saidi, A.M. Mandalari, R. Kolcun, H. Haddadi, D.J. Dubois, D. Choffnes, G. Smaragdakis, and A. Feldmann, “A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild”, 20st ACM Internet Measurement Conference (IMC 2020), October 2020, https://dl.acm.org/doi/pdf/10.1145/3419394.3423650.
Lecture #9: IoT Security in Non-Carpeted Areas
[Lora] X. Wang, E. Karampatzakis, C. Doerr, and F.A. Kuipers, “Security Vulnerabilities in LoRaWAN”, Proc. of the 3rd ACM/IEEE International Conference on Internet-of-Things Design and Implementation (IoTDI), Orlando, Florida, USA, April 17-20, 2018, https://pure.tudelft.nl/portal/files/46032668/IoTDI2018.pdf
[Traffic] Chen, Qi Alfred, et al. “Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.” NDSS. 2018. https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018_01B-2_Chen_paper.pdf
Lecture #10: IoT Honeypots (re-sit)
[IoTPOT] Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow. “IoTPOT: Analysing the Rise of IoT Compromises”. 9th USENIX Workshop on Offensive Technologies (co-located with USENIX Sec ’15), WOOT ’15, Washington, DC, https://christian-rossow.de/publications/iotpot-woot2015.pdf
[Honware] Vetterl, Alexander, and Richard Clayton. “Honware: A virtual honeypot framework for capturing CPE and IoT zero days.” Symposium on Electronic Crime Research (eCrime). IEEE. 2019. https://www.cl.cam.ac.uk/~amv42/papers/vetterl-clayton-honware-virtual-honeypot-framework-ecrime-19.pdf
Lab Assignment
[RFC8520] E. Lear, R. Droms, and D. Romascanu, “Manufacturer Usage Description Specification”, RFC 8520, March 2019, https://tools.ietf.org/html/rfc8520
[MUD] Ayyoob Hamza, Dinesha Ranathunga, H. Habibi Gharakheili, Matthew Roughan, Vijay Sivaraman, “Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles” (Technical Report), April 2018, https://arxiv.org/abs/1804.04358
[SPIN] Lastdrager, E.E.H. and Hesselman, C.E.W. and Jansen, J. and Davids, M., “Protecting Home Networks From Insecure IoT Devices,” Proceedings of the 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Bugapest, Hungary, 20-24 April 2020, https://www.sidnlabs.nl/downloads/7FokYsWdEqs3rC3I9d0xOb/89b5f986185bb15d4e57bd22824c882f/Protecting_Home_Networks_From_Insecure_IoT_Devices.pdf and https://spin.sidnlabs.nl/en/
Background and Additional Reading
[Castle] Noah Apthorpe, Dillon Reisman, Nick Feamster, “A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic”, Workshop on Data and Algorithmic Transparency (DAT ’16), New York University Law School, November 2016, https://arxiv.org/abs/1705.06805
[5G] B. Hubert, “5G: The outsourced elephant in the room”, blog, Jan 2019, https://berthub.eu/articles/posts/5g-elephant-in-the-room/
[Merkel] Opening Speech Internet Governance Forum, Bundes Chancellor Merkel, Nov 2019, https://www.youtube.com/watch?v=4f2w9Ri_XPw&t=1598s (as of 26:00)
[WEIS] E. Leverett, R. Clayton, and R. Anderson, “Standardisation and Certification of the `Internet of Things’”, 16th Annual Workshop on the Economics of Information Security (WEIS2017), USA, June 2017, https://www.cl.cam.ac.uk/~rja14/Papers/weis2017.pdf
[IMC] J. Ren, D. J. Dubois, D. Choffnes, A. M. Mandalari, R. Kolcun, and H. Haddadi, “Information Exposure from Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach”, Internet Measurement Conference (IMC2019), Amsterdam, Netherlands, Oct 2019, https://moniotrlab.ccis.neu.edu/wp-content/uploads/2019/09/ren-imc19.pdf
Background
Motivation
The “Internet of Things” (IoT) is an emerging Internet application that promises to make our society smarter, safer, and more sustainable. Analysist expect the IoT will connect 20-30 billion everyday objects to the Internet, such as cars, drones, robots, traffic lights, door locks, and light bulbs.
The key potential of the IoT is its pervasive and passive nature: it’ll be all around us through (tiny) sensors and actuators, operating passively and invisibly “in the background” of our daily lives [WEIS]. Conceptually, the IoT continually interprets and updates a distributed online representation of people’s physical environments based on data from a wide range of sensors and then uses this model to act upon the real world through actuators, all typically without human involvement or awareness.
While the extraordinary high expectations that folks have of the of the IoT may come true, we believe there is a need to complement such optimism with a recognition of the also extraordinary safety and privacy risks to society that the IoT brings. For example, adversaries can exploit vulnerabilities in insecure IoT devices to launch massive DDoS attacks on Internet infrastructure, such as the DDoS attacks on DNS provider Dyn of late 2016 [Mirai], which led to large-scale outages of popular services such as Spotify and Twitter. In addition, it may also jeopardize the privacy and safety of users, for example because insecure IoT devices enable adversaries to remotely capture the video feed of online baby monitors or remotely open doors or change room temperatures.
Another concern is that the IoT is opaque to users: their IoT devices often interact with remote services on the Internet to perform their tasks [Castle, IMC], but users will typically be unaware of this “backend” of the IoT. For example, they will usually not know the companies that operate these services and that process users’ data (e.g., hyper giants such as Google) and the legal jurisdiction that applies. The societal risk is that we lose view of and control over the infrastructure on which the IoT builds and the public values that we find important in the Netherlands and Europe (“digital sovereignty”) [Merkel].
Synopsis
SSI provides you with an overview of current IoT security challenges and technical solutions to address them, for instance using profiles that describe the behavior of IoT devices, measurement systems, and security systems for home networks that automatically block outgoing DDoS traffic. SSI will test your ability to understand, apply, and modify a few of these solutions.
SSI aims to provide you with 20% broad expertise and 80% deep technical expertise.
The study material for SSI consists of (1) scientific papers and IETF RFCs and (2) a hands-on lab assignment to measure the behavior of IoT devices and describe it through a device profile. To satisfy the learning objectives of this course we take a paper-based approach compared to the traditional approach of using textbooks. We do this since we believe that contrary to some other networking courses, the dynamic nature of IoT security concept needs to be treated using fresh enough teaching material, which makes recently published papers at high reputation academic venues being a nice fit for our goal.
Learning Outcomes
After successful completion of SSI you will:
- Understand IoT concepts and applications, security threats, technical solutions, and a few relevant standardization efforts in the IETF
- Be able to analyze network traffic of IoT devices and create device profiles that describe this behavior
- Understand the operational business of DNS operators and the impact the IoT may have on them (industry perspective)
SSI also contributes to your skills to independently carry out research projects and to develop services and systems.
Contents
- Overview of IoT concepts and applications
- IoT security threats
- Device description languages
- IoT and threat measurement systems
- Mitigation functions
- IoT standardization in the IETF
Organization
SSI is a collaboration of the University of Twente and SIDN Labs (www.sidnlabs.nl), the research team of the operator of the Netherlands’ top-level domain, .nl. SIDN Labs’ goal is to increase the trustworthiness of the Internet infrastructure for our society, for instance through SPIN [SPIN], an open source security system that protects the Internet and end-users from compromised IoT devices.
Study Material
The study material of SSI consists of academic papers and (draft) IETF standards (RFCs), the MUD RFC.
Related Courses 4TU Cyber Security: