Enhancing IoT Security

Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Introduction

2

The Internet of Things and its Security Requirements

  • Internet of Things - A brief introduction
  • Networking in the IoT device - The framework
  • Need to secure IoT - Its limitations
  • Cyber security versus IoT security and cyber-physical systems
  • IoT architecture
  • Authorization and authentication requirement in IoT
  • Security in enabling technologies behind the Internet of Things
  • IoT networking protocols and its security
  • Domain-specific IoT and its security concerns
  • IoT supporting technologies
  • Conclusion
3

IoT Security - Vulnerabilities, Attacks, and Countermeasures

  • Introduction
  • Information Assurance: components
  • Threats
  • Vulnerabilities
  • Risk
  • Insecure Access control
  • Attacks: types, composition, and tools
  • Threat modeling for IoT systems
  • Conclusion
4

Security Engineering for IoT Development

  • Introduction
  • Building Security into design and development
  • The IoT security life cycle: Secure design
  • Conclusion
5

IoT Security Lifecycle

  • Introduction
  • Phase 2: Implementation and Integration
  • Phase 3: Operations and maintenance
  • Phase 4: Dispose
6

IoT as Interconnection of Threats

  • Sybil attack detection in vehicular network
  • Malware Propagation and control in Internet of Things
  • Solution-based analysis of attack vectors on smart home systems
  • Network robustness of the Internet of Things
  • Conclusion
7

Crypto Foundations I

  • Cryptography and its role in securing the IoT
  • Cryptography and its primitives in the IoT
  • Secrecy and secret-key capacity in IoT
  • Encryption and decryption
  • Conclusion
8

Crypto Foundations II

  • Message integrity- Hash functions and their security
  • Message authentication
  • Random number generation
  • Cipher suites
  • Signature algorithm means of IoT node authentication
  • Cryptographic key management
  • Examining cryptographic controls for IoT protocols
  • Transport encryption
  • Conclusion
9

Privacy Preservation for the Internet of Things

  • Privacy preservation
  • Classification of privacy threats in IoT
  • Privacy preservation techniques
  • Futuristic approach of privacy preservation data dissemination
  • Privacy preservation for IoT used in smart buildings- A case study
  • Conclusion
10

Location Privacy Enhancement in the Internet of Vehicles

  • Location privacy and its requirements in IoV
  • Traditional location-privacy preservation solutions
  • A new location-privacy preservation scheme: A MixGroup approach
  • Conclusion
11

Privacy Protection in Key Personal IoT Applications

  • Concept of personal IoT
  • Security aspect of personal IoT
  • Conclusion
12

Trust and Trust Models for the IoT

  • Concept of trust and its role in securing IoT
  • A brief study on Trust Management System
  • Classification of Trust Management Systems in IoT network
  • Challenges in existing trustable IoT techniques
  • Introducing Nova-Genesis as an IoT architecture
  • Conclusion
13

Framework for Privacy and Trust in IoT

  • The concept of user-centric Internet of Things
  • Issues in user-centric Internet of Things
  • SocIoTal- A socially aware citizen-centric Internet of Things
  • Conclusion
14

Preventing Unauthorized Access to Sensor Data and Authentication in IoT

  • The idea of cooperation in IoT
  • The practical implementation of cooperative authentication
  • Bargaining-based dynamic game model for cooperative authentication
  • Analysis of dynamic game model for cooperative authentication
  • Variants of entity authentication
  • Message authentication: content delivery in VANET 
  • Conclusion
15

Computational Security for the IoT and Beyond

  • An introduction to computational models and their security
  • Complex systems
  • Examples of complex systems with their security characteristics
  • Computational tools for complex systems
  • Future scope
  • Conclusion
16

Identity and Access Management Solutions for the IoT

  • Introduction to identity and access management for the IoT
  • The identity lifecycle
  • Authentication credentials
  • IoT IAM infrastructure
  • Authorization and access control
  • Conclusion
17

Privacy-Preserving Time Series Data Aggregation for IoT

  • Data aggregation on IoT system
  • Time-series data aggregation privacy preservation scheme
  • Conclusion 
18

Path Generation Scheme for Real-Time Green IoT

  • Green Internet of Things: An introduction
  • Real-time GIOT and its issues
  • Real-time query processing in the Green Internet of Things
  • Conclusion
19

Security Protocols for IoT Access Networks and Their Impact on Mobile Networks

  • Existing security features of IoT protocols
  • Futuristic security protocol/algorithm for IoT network
  • Impact of IoT security on mobile networks 
  • Conclusion
20

Cloud Security for the IoT

  • Cloud services and the IoT
  • IoT threats from the perspective of cloud security
  • Exploring cloud service provider IoT offerings
  • Cloud IoT security controls
  • An enterprise IoT cloud security architecture
  • New directions in cloud-enabled IOT computing 
  • Conclusion
21

Policy-Based Approaches for Informed Consent in IoT

  • Informed consent
  • A policy-based solution for informed consent in IoT
  • Conclusion
22

Blockchains for Internet of Things

  • Blockchain technology: The introduction
  • Crypto-currencies
  • Bitcoin P2P network
  • Distributed consensus
  • Smart contracts
  • Blockchain wallets
  • Altcoins
  • Anonymity
  • Conclusion
23

Game Theory Foundation

  • Introduction to Game-Theoretic approach
  • Best response and Nash equilibrium
  • Mixed-strategy or randomized-strategy
  • Repeated games
  • Bayesian games
  • Coalitional games
  • Conclusion
24

Security Products

  • Existing IoT security products
  • Testbed on security and privacy of IoTs
  • IoT databases and its security
  • Conclusion

Enhancing IoT Security

$ 386.55

Buy Now

Related Courses

All Course
scroll to top