Вы находитесь на странице: 1из 1

Security in IoT

Possible Areas:
1. Applied Cryptography and Intrusion Detection
2. One way Hash Function and Integrity
3. Encryption Algorithms and Confidentiality
4. Digital Signature and Authentication
5. Intrusion Detection
6. Discussion on security threats on specific IoT applications
7. General Cyber Security concepts in IoT
8. Security threats in IoT (Unauthorized access, Side-channel attacks, Safety risks)
9. Quantum security
10. Block chain  Crypto Currency
11. Cryptanalysis Vs. Stagenoanalysis
12. Tools in (S/W, and H/W) in IoT

UNIT – I INTRODUCTION: SECURING THE INTERNET OF THINGS


Security Requirements in IoT Architecture, Security in Enabling Technologies, Security Concerns in IoT
Applications. Security Architecture in the Internet of Things, Security Requirements in IoT, Insufficient
Authentication/Authorization, Insecure Access Control, Threats to Access Control, Privacy, and
Availability, Attacks Specific to IoT. Vulnerabilities, Secrecy and Secret, Key Capacity,
Authentication/Authorization for Smart Devices, Transport Encryption, Attack and Fault trees, The
secure IoT system implementation lifecycle.
UNIT – II CRYPTOGRAPHIC FUNDAMENTALS FOR IOT
Cryptographic primitives and its role in IoT, Encryption and Decryption, Hashes, Digital Signatures,
Random number generation, Cipher suites, Key management fundamentals, Cryptographic controls
built into IoT messaging and communication protocols, IoT Node Authentication
UNIT – III IDENTITY & ACCESS MANAGEMENT SOLUTIONS FOR IOT
Identity lifecycle, Authentication credentials, IoT IAM infrastructure, Authorization with
Publish/Subscribe schemes, Access control
UNIT – IV PRIVACY PRESERVATION FOR IOT
Privacy Preservation Data Dissemination, Privacy Preservation for IoT Used in Smart Building, Exploiting
Mobility Social Features for Location Privacy Enhancement in Internet of Vehicles, Lightweight and
Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory
Sensing.
UNIT – V CLOUD SECURITY FOR IOT
Cloud services and IoT, Offerings related to IoT from cloud service providers, Cloud IoT security controls,
An enterprise IoT cloud security architecture, New directions in cloud enabled IoT computing

Practical Tools:
1. IoTFy tool
2. ForeScout CounterACT
3. LogRhythm Netmon
4. Trustwave
5. Zingbox

Вам также может понравиться