Module Number:
| 11862
|
Module Title: | Pervasive System Security |
|
Sicherheit in Pervasiven Systemen
|
Department: |
Faculty 1 - Mathematics, Computer Science, Physics, Electrical Engineering and Information Technology
|
Responsible Staff Member: | -
Prof. Dr. rer. nat. Langendörfer, Peter
|
Language of Teaching / Examination: | English |
Duration: | 1 semester |
Frequency of Offer: |
Every winter semester
|
Credits: |
6
|
Learning Outcome: | Upon completion of the module, students will know the basics of security in pervasive systems. They will know the different fields of work in which the systems are used, such as telemedicine and homeland security. They are able to identify security requirements and threats to privacy. They understand how the means presented are used to ensure security requirements. They are able to apply different algorithms in the field. They will be able to analyze security protocols and analyze their weaknesses. |
Contents: | This lecture introduces different kinds of pervasive systems considering diverse application areas such as telemedicine and homeland security. These examples are used to elaborate security and privacy requirements as well as threats against these goals. Then means ensuring the security goals will be introduced, here a clear focus is on cryptographic systems as the means of implementing security goals. Selected security protocols e.g. for key exchange, digital signature generation/verification, etc. will be discussed taking into account their limitations and means to successfully attack those protocols. Topics covered include in particular:
- Topology, functionality and limitations of pervasive systems in different application areas.
- Symmetric and asymmetric cryptosystems
- Security protocols for key exchange
- Generation and verification of digital signatures
- Security aspects in the algorithms and their implementations
- Security vulnerabilities of the protocols and possible attack targets
- Privacy protection issues
- Physical attacks and their classification
- Side channel attacks (SCA) on encryption means and appropriate countermeasures
- Physical processes exploited for SCA; basics of measurement
- Fault injection (FI) attacks, physical basics and suitable countermeasures
|
Recommended Prerequisites: | Knowledge of the content of the modules
- 11454: Introduction to Computer Networks
- 12864: Wireless Sensornetworks: Concepts, Protocolls and Applications
as well as basics in mathematics and physics. |
Mandatory Prerequisites: | None |
Forms of Teaching and Proportion: | -
Lecture
/ 2 Hours per Week per Semester
-
Exercise
/ 1 Hours per Week per Semester
-
Self organised studies
/ 135 Hours
|
Teaching Materials and Literature: | - Paar, C., Pelzl, J. (2010): Understanding Cryptography - A Textbook for Students and Practitioners, Springer
- Schneier, Bruce (1996): Applied Cryptography : Protocols, Algorithms, and Source Code in C, Wiley
- F. Koeune, F. Standaert (2005): A Tutorial on Physical Security and Side-Channel Attacks, Springer
- Ross Anderson (2020): Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Wiley
|
Module Examination: | Prerequisite + Final Module Examination (MAP) |
Assessment Mode for Module Examination: | Prerequisite:
- Successful completion of exercise assignments
Final module examination:
- Written examination, 90 min. OR
- Oral examination, 30 min. (with small number of participants)
In the first lecture it will be anounced, if the examination will be offered in written or oral form. |
Evaluation of Module Examination: | Performance Verification – graded |
Limited Number of Participants: | 30 |
Part of the Study Programme: | -
Abschluss im Ausland /
Cyber Security /
keine PO
-
Master (research-oriented) /
Cyber Security /
PO 2017
-
Abschluss im Ausland /
Informatik /
keine PO
-
Master (research-oriented) /
Informatik /
PO 2008
- 2. SÄ 2017
-
Master (research-oriented) /
Künstliche Intelligenz Technologie /
PO 2022
|
Remarks: | - Study programme Informatik M.Sc.: Compulsory elective module in "Angewandte und technische Informatik" (level 400)
- Study programme Cyber Security M.Sc.: Compulsory elective module in complex "Cyber Security Methods"
- Study programme Künstliche Intelligenz Technologie M.Sc.: Compulsory elective module in complex „Software-basierte Systeme“
|
Module Components: | Lecture: Pervasive System Security Accompanying exercises |
Components to be offered in the Current Semester: | |