Advanced Topics In IoT Security

General Information

Title: Advanced Topis in IoT Security

Lecturer: Mohammad Hamad, Sebastian Steinhorst

Loaction:  3999

Time: Each  Wednesday, 9:45-12:00

Attending lectures:  Mandatory

Language:  Lecture in English language.

Credits: 5 ECTS credits

Duration: 3 SWS lecture

Application Process

Due to the limitted numbers of topics we use an application process to assign the topics.

If you are interested in one of the topics below, please send your application to Express your interest and explain why you want to have that specific topic and why you think that you are most suitable for the topic. This allows us to choose the most suitable candidate for the desired topic to maximize the course's learning outcome and to avoid dropouts. Also, you can indicate a second topic that you would like to take, such that we can still find a topic for you if your primary choice is not available. Additionally, If none of the topics interest you, you can propose a topic you wish to investigate. We have a place for three topics that the students can suggest. The topics should be in the domain of IoT/CPS security. 

Deadline: We encourage you to apply until the 16.04.2023. Afterwards we will assign the topics and notify all applicants. Once you are given the topic, we will ask for your confirmation.


ID Topic status

Cybersecurity Inciedent Response Systems using Reinforcement Learning

Seed: Intrusion Response Systems for Cyber-Physical Systems: A Comprehensive Survey


Bootstrapping Remote Secure Key Infrastructure (BRSKI)

Seed:  RFC8995


State-aware Security for Smart Vehicles 


  • Data driven extraction of vehicle states from CAN bus traffic for cyberprotection and safety
  • CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem

Message Authentication in Automotive Ethernet Networks 


  1. WIP: The Feasibility of High-Performance Message Authentication in Automotive Ethernet Networks
  2. Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet

Using TLS to Secure Automotive Communication

Seed: TLS to Secure In-Vehicle Networks


Comparative Analysis of NIST Lightweight Cryptography for IoT Applications

Seed: Analysis of Practical Application of Lightweight Cryptographic Algorithm ASCON


Wireless MitM Attacks and their impact on Wireless Time Synchronization


  1. Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks: A state of the art review
  2. Man-in-the-middle attack in wireless and computer networking — A review
8 Proposed by Student: Software Defined Networking for Automotive Assigned
9 You can choose your own topic! Avilable
10 You can choose your own topic! Avilable


Description of Achievement and Assessment Methods

Achievement of the intended learning outcomes is assessed by submitting a four pages seminar paper (50%), regular discussions about the progression of the project and next steps (25%), and a 30-minute oral presentation with a discussion of the paper topic (25%).

Intended Learning Outcomes

Upon successful completion of the course, students are able to:
• Demonstrate knowledge of the security issues of the Internet of Things
• Understanding the vulnerabilities that threaten IoT systems and the countermeasures used to protect this system.
• Develop critical thinking skills, lead a scientific discussion, write and present research ideas.


In this seminar, students will broaden their understanding of IoT security by discussing recent attacks and vulnerabilities that threaten different IoT systems (such as intelligent vehicles, e-health systems, etc.) and countermeasure approaches proposed to mitigate these attacks. Many topics will be offered, and each student needs to choose one topic and write a short paper about it. The seminar will mimic the workflow of real conferences: Students need to submit research papers, perform peer-review to other submissions, and finally present their papers.

Teaching and Learning Methods

Each participant prepares a seminar paper based on the topic that (s)he selects. At the end of the semester, students need to present their papers in front of the seminar participants. During the semester, students need to present their progress and lead a discussion about their topic every second week. Other participants need to engage in the discussion. In the introductory parts of the seminar, the skills that students need to write their papers will be taught in a teacher-centered style.