IoT Security
OBJECTIVE
At the end of successful completion of the course, students will be able to:
Understand theoperational technology of IoT
Studyvarious vulnerabilities, threats & risks inIoT.
Explain various IoTsecurity issues.
Learn different testing tools and different attacks ofIoT
DescribevariousIoT security needs.
Unit I Introduction to Operational Technology 9
Overview of industrial control systems (ICS), ICS operation &components,Perduemodel,
SCADA systems, Cyber-physical systems (CPS) &IoT
Unit II IoT Vulnerabilities, Threats & Risks 9
STRIDE methodology, OWASP Iot vulnerabilities, Privacy & trust,
Insufficientauthentication/authorization, Insufficient access control, Attacks on IoT data,
Attackson IoT layered architecture, Security concerns in IoT applications, Security concernsin
SCADA
Unit III IoT Pen Testing 9
Active vulnerability analysis tools, Port scanning, Operating system fingerprinting andversion
scanning, Penetration testing, Attack surface mapping
Unit IV Tools, Framework Firmware Reverse Engineering 9
Exploitation Tools & FrameworksExploitation using I2C & SPI, JTAG debugging and
exploitation,Understanding firmware, Extracting firmware, Manual firmware extraction,
Automated file system extraction, Firmware internals, Backdooring afirmware, Static & dynamic
analysis
Module VI Radio & Side Channel Attacks 9
Software defined radio, Exploiting ZIGBEE & BLE, Power analysis attack,Invasive attack,
Perturbation -attacks, Electromagnetic side channel attack, faultinjection attack, timing attack,
covert channel attacks TOTAL: 45 Periods
COURSE OUTCOMES:
Unit K
CO CO Statement
Number Level*
CO 1 Summarize the operational technology of IoT 1 K2
CO 2 Describe various vulnerabilities, threats & risks in IoT. 2 K2
CO 3 Classify various IoT security issues. 3 K3
CO 4 Use different testing tools for IoT 4 K3
CO 5 Identify to secure IoT from different attacks. 4 K3
CO 6 Relate varoiusIoT security needs. 5 K3
CO-PO/PSO Mapping:
Program Outcomes Program
specific
COs
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO3
CO 1 2 1 2 2
CO 2 2 1 2 2
CO 3 3 2 1 2 2
CO 4 3 2 1 2 2
CO 5 3 2 1 2 2
CO 6 3 2 1 2 2 2
Course 3 2 1 2 2 2 3 2 1
Text Books:
1 “Securing the Internet of Things”, Shancang Li, Li Da Xu, Syngress,Elsevier, 2017
2 “Security and Privacy in Internet of Things (IoTs) Models, Algorithms, andImplementations”,
Edited by Fei Hu, CRC Press, 2016
3 “Practical Internet of Things Security”, Brian Russell Drew Van Duren, PackPublishing, 2016