CS5410 - Security in Cyber Physical System

Course Data :

Description:To learn the security principles and methodologies for Cyber Physical Systems. 1. Ability to understand the importance of security Cyber Physical Systems and Internet of Things. 2. Understand the technologies and legal issues behind attack. 3. Ability to understand different attacks and mitigation strategies. 4. Understand trust, cloud and block chain-based security models. CourseContent:1. IoT and Cloud Computing Fundamentals IoT Definition – IoT Architecture – Devices – Operating Systems – Communication protocols – Messaging Protocols – Transport protocols – Network protocols – Data Link and Physical Protocols – IoT data collection, storage and analytics – Cloud computing background – Cloud Computing models and infrastructure – Cloud computing and IoT integration 2. Cyber Physical Systems – A case study CPS definition – Application specific CPS design and architecture – Functional and non-functional requirements – CPS architectures – closed loop, layered, publish and subscribe, and blackboard – CPS communication and control protocols – Industrial control systems protocol, radio technology and telemetry – Use of IoT in CPS. 3. IoT Attacks Threats – Vulnerabilities and Risks – IoT attack types – Attack trees, Fault Trees, Merging fault and attack trees – Wireless reconnaissance and mapping attacks – Security Protocol Attacks – Physical security attacks – Application security attacks – IoT Threat Modelling 4. Cryptographic Fundamentals Encryption and decryption – symmetric, asymmetric – Hashes – Digital signatures – Symmetric, Random number generators and cipher suites – Key management, distribution storage, escrow and zeroization – Cryptographic controls for IoT – ZigBee, Bluetooth-LE, Near Field Communication (NFC) – Cryptographic controls for IoT messaging protocols – MQTT, CoAP, DDS and REST. 5. CPS Secure Development Security design, Threat assessments – privacy, safety, compliance and security integration – Security processes – risk and liability exposures – IoT physical security plan – Device selection – OS considerations – Cryptographic selection – authentication / authorisation and edge security monitoring. 6. CPS Identity and Access Management Solutions Identity life cycle – naming conventions, secure bootstrap, credential and attribute provisioning, account monitoring, control, updates and activation/deactivation – Authentication credentials – passwords, symmetric keys, certificates, X.509, IEEE 1609.2, Biometrics – IoT IAM infrastructure – 802.1x, PKI architecture and revocation – Authorization and Access Control – Oauth2.0, publish and subscribe, and communication protocols. 7. CPS and privacy Private information leaks – privacy approach to credentials – surveillance – IoT privacy impact assessments – collecting and characterising information, security, data retention, information sharing, auditing and accountability. Privacy embedded design – end-to-end security, visibility and transparency, privacy engineering. 8. CPS edge protection and analysis Intrusion Detection in CPS - Challenges, - Designing Signature, Anomaly and Stateful protocol-based IDS - Machine Learning Techniques – rule-based, statistical and data mining-based systems. 9. Cloud Security for CPS Cloud services and IoT – Assets, inventory management, service provisioning, real time monitoring in the cloud, sensor coordination, message transport, cloud specific threats. 10. Block Chain and CPS Security Introduction to block chain – architecture and transaction processing operation – IoT transactions and block chain – benefits of IoT transaction monitoring – distributed ledgers, time stamping, smart contracts, security – Open architecture benefits and challenges – Use cases – smart homes and smart city examples. 11. Trust in CPS Embedding root of trust and chain of trust in IoT devices – security policies and law enforcement – defence counter measures in IoT device Malware and ransomware – Malware analysis and detection methods – ransomware detection and mitigation – Monitoring network flows for detection and mitigation. 12. Security of Industrial IoT Systems IIoT platform and architecture – challenges of IIOT – IIOT services security – attacks – on Thing, Network, Middleware and Application layer.

TextBooks:[1] B Russell and D V Duren, “Practical Internet of Things Security”, Packt Publishing, 2016 [2] William Mougayar, “The Business Blockchain Promise, Practice, and Application of the Next Internet Technology”, Wiley, 2016 [3] S. Li and L. D. Xu, “Securing the Internet of Things”, Elsevier, 2017 [4]. K-C. Li, B B Gupta and D P Agrawal, “ IOT – Recent advances in security, privacy and trust for IoT and CPS”, CRC Press, 2021.

ReferenceBooks:[1] B Russell and D V Duren, “Practical Internet of Things Security”, Packt Publishing, 2016 [2] William Mougayar, “The Business Blockchain Promise, Practice, and Application of the Next Internet Technology”, Wiley, 2016 [3] S. Li and L. D. Xu, “Securing the Internet of Things”, Elsevier, 2017 [4]. K-C. Li, B B Gupta and D P Agrawal, “ IOT – Recent advances in security, privacy and trust for IoT and CPS”, CRC Press, 2021.

Pre-Requisites

    None

Parameters

Credits Type Date of Introduction
4-0-0-0-8-12 Elective Jan 2024

Previous Instances of the Course


© 2016 - All Rights Reserved - Dept of CSE, IIT Madras
Website Credits