Advanced Computer Networks (Summer 2020): Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 31: | Line 31: | ||
|{{Hl2}} |'''Exercise''' | |{{Hl2}} |'''Exercise''' | ||
|- | |- | ||
| align="right" | | | align="right" | 21.04.2020 | ||
| Introduction to Internet of Things | | Introduction to Internet of Things | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 37: | Line 37: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 23.04.2020 | ||
| The Arm Architecture (Cortex M-class vs. Cortex A-class) | | The Arm Architecture (Cortex M-class vs. Cortex A-class) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 43: | Line 43: | ||
| Get hardware & software working | | Get hardware & software working | ||
|- | |- | ||
| align="right" | | | align="right" | 28.04.2020 | ||
| Local Communication (UART, I2C, SPI) | | Local Communication (UART, I2C, SPI) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 49: | Line 49: | ||
| Use of a sensor communication | | Use of a sensor communication | ||
|- | |- | ||
| align="right" | | | align="right" | 30.04.2020 | ||
| Radio Technologies (BLE, Thread, NB-IoT, LoRa) | | Radio Technologies (BLE, Thread, NB-IoT, LoRa) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 55: | Line 55: | ||
| Use of a radio technology | | Use of a radio technology | ||
|- | |- | ||
| align="right" | | | align="right" |05.05.2020 | ||
| Internet Protocols for IoT (CoAP and MQTT vs. HTTP) | | Internet Protocols for IoT (CoAP and MQTT vs. HTTP) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 61: | Line 61: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 07.05.2020 | ||
| Security Threats and Security Requirements | | Security Threats and Security Requirements | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 67: | Line 67: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 12.05.2020 | ||
| Device Management | | Device Management | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 73: | Line 73: | ||
| Use of LwM2M | | Use of LwM2M | ||
|- | |- | ||
| align="right" | | | align="right" | 14.05.2020 | ||
| Securing IoT - Communication Security | | Securing IoT - Communication Security | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 79: | Line 79: | ||
| Secure IoT communication | | Secure IoT communication | ||
|- | |- | ||
| align="right" | | | align="right" | 19.05.2020 | ||
| Securing IoT – Hardware Security Technology (TEEs and TrustZone) | | Securing IoT – Hardware Security Technology (TEEs and TrustZone) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 85: | Line 85: | ||
| Use hardware security mechanisms | | Use hardware security mechanisms | ||
|- | |- | ||
| align="right" | | | align="right" | 21.05.2020 | ||
| Securing IoT – Firmware Updates, Secure Boot and Attestation | | Securing IoT – Firmware Updates, Secure Boot and Attestation | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 91: | Line 91: | ||
| Write your own bootloader | | Write your own bootloader | ||
|- | |- | ||
| align="right" | | | align="right" | 26.05.2020 | ||
| Privacy | | Privacy | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 97: | Line 97: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" |28.05.2020 | ||
| Exam | | Exam | ||
| Hannes Tschofenig | | Hannes Tschofenig |
Revision as of 12:27, 6 April 2020
Details
Workload/ECTS Credits: | 5ECTS |
Module: | M.Inf.1223.Mp OR 3.17: Selected Topics in Advanced Networking (ITIS) |
Lecturer: | Dr. Hannes Tschofenig, Prof. Xiaoming Fu |
Teaching assistant: | Bangbang Ren |
Time: | Tuesday 10-12am (lecture), Thursday 10-12am (lecture), Thursday 12-13pm (exercise). (*Note only until 28.05.2020!*) |
Place: | Room 2.101 |
UniVZ | https://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=248177&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung |
Course description
This lecture will introduce concepts of computer networking related to Internet of Things devices. The goal of the course is to make you feel comfortable designing and secure IoT-based Internet communication. The course gives you an understanding of
- The hardware used in IoT devices,
- Embedded software development,
- Local communication to sensors and actuators,
- Internet protocols specifically designed for IoT devices,
- Protocols to manage the lifecycle of IoT devices,
- Security technologies used on constrained device, and
- Data protection and privacy.
There will be exercises and it is mandatory to complete all the exercises to attend the final exam. Each student will be provided with IoT hardware. For software development the preferred tool is a professional IDE developed by Keil.
Schedule (Tentative)
Date | Topic | Lecturer | Lecture slides | Exercise |
21.04.2020 | Introduction to Internet of Things | Hannes Tschofenig | ||
23.04.2020 | The Arm Architecture (Cortex M-class vs. Cortex A-class) | Hannes Tschofenig | Get hardware & software working | |
28.04.2020 | Local Communication (UART, I2C, SPI) | Hannes Tschofenig | Use of a sensor communication | |
30.04.2020 | Radio Technologies (BLE, Thread, NB-IoT, LoRa) | Hannes Tschofenig | Use of a radio technology | |
05.05.2020 | Internet Protocols for IoT (CoAP and MQTT vs. HTTP) | Hannes Tschofenig | ||
07.05.2020 | Security Threats and Security Requirements | Hannes Tschofenig | ||
12.05.2020 | Device Management | Hannes Tschofenig | Use of LwM2M | |
14.05.2020 | Securing IoT - Communication Security | Hannes Tschofenig | Secure IoT communication | |
19.05.2020 | Securing IoT – Hardware Security Technology (TEEs and TrustZone) | Hannes Tschofenig | Use hardware security mechanisms | |
21.05.2020 | Securing IoT – Firmware Updates, Secure Boot and Attestation | Hannes Tschofenig | Write your own bootloader | |
26.05.2020 | Privacy | Hannes Tschofenig | ||
28.05.2020 | Exam | Hannes Tschofenig |
Prerequisites
- Computer Science I, II; Computer Networks