The human race is going to go through a major transformation in the next ten years thanks to the internet of thing , when such a transformation happens, where internet and technology are going to touch possibly every aspect of our life , the security of the same would be of highest importance , here we will dwell with most popular IoT devices available in the market at present and their security concerns along with potential hacks that can be performed on such devices and to ensure its security according to best global practices.
Unit I: Introduction
Requirement and Basic Properties in Internet of Things, Primary challenges in security maintenance, Confidentiality, Integrity, Availability, Non-Repudiation.
Unit II: Architecture of Internet of Things
Device – device, Device – Cloud, Device – Gateway, Gateway – Cloud, Cloud – Backend – Applications
Unit III: Security Classification and Access Control
Data classification (Public and Private), Internet of Things Authentication and Authorization, Internet of Things Data Integrity
Unit IV: Attacks and Implementation of Internet of Things
Denial of Service, Sniffing, Phishing, DNS Hijacking, Pharming, Defacement, Firmware of the device, Web Application Dashboard , Mobile Application Used to Control, Configure and Monitor the Devices
Unit V: Security Protocols and Management
Firmware of the device, Web Application Dashboard , Mobile Application Used to Control, Configure and Monitor the Devices, Identity and Access Management, Key Management
Disclaimer: Details on this page are subject to change as per University of Delhi guidelines. For latest update in this regard please refer to the University of Delhi website here.