Advanced Computer Networks (Summer 2020): Difference between revisions

From NET Wiki
Jump to navigation Jump to search
No edit summary
Line 31: Line 31:
|{{Hl2}} |'''Exercise'''
|{{Hl2}} |'''Exercise'''
|-
|-
| align="right" | 14.04.2020
| align="right" | 21.04.2020
| Introduction to Internet of Things
| Introduction to Internet of Things
| Hannes Tschofenig
| Hannes Tschofenig
Line 37: Line 37:
|
|
|-
|-
| align="right" | 16.04.2020
| align="right" | 23.04.2020
| The Arm Architecture (Cortex M-class vs. Cortex A-class)
| The Arm Architecture (Cortex M-class vs. Cortex A-class)
| Hannes Tschofenig
| Hannes Tschofenig
Line 43: Line 43:
| Get hardware & software working
| Get hardware & software working
|-
|-
| align="right" | 21.04.2020
| align="right" | 28.04.2020
| Local Communication (UART, I2C, SPI)
| Local Communication (UART, I2C, SPI)
| Hannes Tschofenig
| Hannes Tschofenig
Line 49: Line 49:
| Use of a sensor communication
| Use of a sensor communication
|-
|-
| align="right" | 23.04.2020
| align="right" | 30.04.2020
| Radio Technologies (BLE, Thread, NB-IoT, LoRa)
| Radio Technologies (BLE, Thread, NB-IoT, LoRa)
| Hannes Tschofenig
| Hannes Tschofenig
Line 55: Line 55:
| Use of a radio technology
| Use of a radio technology
|-
|-
| align="right" |28.04.2020
| align="right" |05.05.2020
| Internet Protocols for IoT (CoAP and MQTT vs. HTTP)
| Internet Protocols for IoT (CoAP and MQTT vs. HTTP)
| Hannes Tschofenig
| Hannes Tschofenig
Line 61: Line 61:
|  
|  
|-
|-
| align="right" | 30.04.2020
| align="right" | 07.05.2020
| Security Threats and Security Requirements
| Security Threats and Security Requirements
| Hannes Tschofenig
| Hannes Tschofenig
Line 67: Line 67:
|  
|  
|-
|-
| align="right" | 50.05.2020
| align="right" | 12.05.2020
| Device Management
| Device Management
| Hannes Tschofenig
| Hannes Tschofenig
Line 73: Line 73:
| Use of LwM2M
| Use of LwM2M
|-
|-
| align="right" | 07.05.2020
| align="right" | 14.05.2020
| Securing IoT - Communication Security
| Securing IoT - Communication Security
| Hannes Tschofenig
| Hannes Tschofenig
Line 79: Line 79:
| Secure IoT communication
| Secure IoT communication
|-
|-
| align="right" | 12.05.2020
| align="right" | 19.05.2020
| Securing IoT – Hardware Security Technology (TEEs and TrustZone)
| Securing IoT – Hardware Security Technology (TEEs and TrustZone)
| Hannes Tschofenig
| Hannes Tschofenig
Line 85: Line 85:
| Use hardware security mechanisms
| Use hardware security mechanisms
|-
|-
| align="right" | 14.05.2020
| align="right" | 21.05.2020
| Securing IoT – Firmware Updates, Secure Boot and Attestation
| Securing IoT – Firmware Updates, Secure Boot and Attestation
| Hannes Tschofenig
| Hannes Tschofenig
Line 91: Line 91:
| Write your own bootloader
| Write your own bootloader
|-
|-
| align="right" | 19.05.2020
| align="right" | 26.05.2020
| Privacy
| Privacy
| Hannes Tschofenig
| Hannes Tschofenig
Line 97: Line 97:
|  
|  
|-
|-
| align="right" |26.05.2020
| align="right" |28.05.2020
| Exam
| Exam
| Hannes Tschofenig
| Hannes Tschofenig

Revision as of 13:27, 6 April 2020

Details

Workload/ECTS Credits: 5ECTS
Module: M.Inf.1223.Mp OR 3.17: Selected Topics in Advanced Networking (ITIS)
Lecturer: Dr. Hannes Tschofenig, Prof. Xiaoming Fu
Teaching assistant: Bangbang Ren
Time: Tuesday 10-12am (lecture), Thursday 10-12am (lecture), Thursday 12-13pm (exercise). (*Note only until 28.05.2020!*)
Place: Room 2.101
UniVZ https://univz.uni-goettingen.de/qisserver/rds?state=verpublish&status=init&vmfile=no&publishid=248177&moduleCall=webInfo&publishConfFile=webInfo&publishSubDir=veranstaltung


Course description

This lecture will introduce concepts of computer networking related to Internet of Things devices. The goal of the course is to make you feel comfortable designing and secure IoT-based Internet communication. The course gives you an understanding of

  • The hardware used in IoT devices,
  • Embedded software development,
  • Local communication to sensors and actuators,
  • Internet protocols specifically designed for IoT devices,
  • Protocols to manage the lifecycle of IoT devices,
  • Security technologies used on constrained device, and
  • Data protection and privacy.

There will be exercises and it is mandatory to complete all the exercises to attend the final exam. Each student will be provided with IoT hardware. For software development the preferred tool is a professional IDE developed by Keil.


Schedule (Tentative)

Date Topic Lecturer Lecture slides Exercise
21.04.2020 Introduction to Internet of Things Hannes Tschofenig
23.04.2020 The Arm Architecture (Cortex M-class vs. Cortex A-class) Hannes Tschofenig Get hardware & software working
28.04.2020 Local Communication (UART, I2C, SPI) Hannes Tschofenig Use of a sensor communication
30.04.2020 Radio Technologies (BLE, Thread, NB-IoT, LoRa) Hannes Tschofenig Use of a radio technology
05.05.2020 Internet Protocols for IoT (CoAP and MQTT vs. HTTP) Hannes Tschofenig
07.05.2020 Security Threats and Security Requirements Hannes Tschofenig
12.05.2020 Device Management Hannes Tschofenig Use of LwM2M
14.05.2020 Securing IoT - Communication Security Hannes Tschofenig Secure IoT communication
19.05.2020 Securing IoT – Hardware Security Technology (TEEs and TrustZone) Hannes Tschofenig Use hardware security mechanisms
21.05.2020 Securing IoT – Firmware Updates, Secure Boot and Attestation Hannes Tschofenig Write your own bootloader
26.05.2020 Privacy Hannes Tschofenig
28.05.2020 Exam Hannes Tschofenig

Prerequisites

  • Computer Science I, II; Computer Networks