Advanced Topics In IoT Security

General Information

Title: Advanced Topis in IoT Security

Lecturer: Mohammad Hamad, Sebastian Steinhorst

Loaction:  4981

Time: Each Thursday, 9:45-12:00

Language:  Lecture in English language.

Credits: 5 ECTS credits

Duration: 3 SWS lecture

Application Process

Due to the limitted numbers of topics we use an application process to assign the topics.

If you are interested in one of the topics below, please send your application to mohammad.hamad@tum.de. Express your interest and explain why you want to have that specific topic and why you think that you are most suitable for the topic. This allows us to choose the most suitable candidate for the desired topic to maximize the course's learning outcome and to avoid dropouts. Also, you can indicate a second topic that you would like to take, such that we can still find a topic for you if your primary choice is not available. Additionally, If none of the topics interest you, you can propose a topic you wish to investigate. We have a place for three topics that the students can suggest. The topics should be in the domain of IoT/CPS security. 

Deadline: We encourage you to apply until the 26.04.2022. Afterwards we will assign the topics and notify all applicants. Once you are given the topic, we will ask for your confirmation.

Topics

This semester we offer the following  topics:

  1. Vehicular State-Aware Defense  (Status: Assigned)
    Paper: SAID: State-aware Defense Against Injection Attacks on In-vehicle Network             

  2. Secure IoT to Cloud Communications   (Status: Assigned)
     Paper: Burglars’ IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds

  3. Automotive Security Standards   (Status: Assigned)
     Standards: ISO12434, UN-ECE R157 (2021-03), UNECE WP29, ISO/AWI 24089

  4. Access Control for IoT Systems  (Status: Assigned)
      Paper: Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation

  5. Attacks Against  Smart Vehicle's Sensors: Camera as an example  (Status: Assigned)
      Paper:  GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems

  6. Low-Overhead Public-Key Cryptosystem for IoT Environments  (Status: Assigned)
    Paper: CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments 

  7. Recovery from Attacks on Smart Vehicles   (Status: Assigned)
    Paper: Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles

  8. Proposed by a Student: "Adversarial attacks on Machine Learning Models in Smart Vehicles"  [Assigned]

  9. Proposed by a Student: "Limiting the Attack Surface of Network IoT Devices"   [Assigned]

  10. Proposed by a Student: "Scalable Data Collection for Incident Response in Industrial IoT Systems"   [Assigned]

Description of Achievement and Assessment Methods

Achievement of the intended learning outcomes is assessed by submitting a four pages seminar paper (50%), regular discussions about the progression of the project and next steps (25%), and a 30-minute oral presentation with a discussion of the paper topic (25%).

Intended Learning Outcomes

Upon successful completion of the course, students are able to:
• Demonstrate knowledge of the security issues of the Internet of Things
• Understanding the vulnerabilities that threaten IoT systems and the countermeasures used to protect this system.
• Develop critical thinking skills, lead a scientific discussion, write and present research ideas.

Content

In this seminar, students will broaden their understanding of IoT security by discussing recent attacks and vulnerabilities that threaten different IoT systems (such as intelligent vehicles, e-health systems, etc.) and countermeasure approaches proposed to mitigate these attacks. Many topics will be offered, and each student needs to choose one topic and write a short paper about it. The seminar will mimic the workflow of real conferences: Students need to submit research papers, perform peer-review to other submissions, and finally present their papers.

Teaching and Learning Methods

Each participant prepares a seminar paper based on the topic that (s)he selects. At the end of the semester, students need to present their papers in front of the seminar participants. During the semester, students need to present their progress and lead a discussion about their topic every second week. Other participants need to engage in the discussion. In the introductory parts of the seminar, the skills that students need to write their papers will be taught in a teacher-centered style.