11862 - Pervasive System Security Modulübersicht

Module Number: 11862
Module Title:Pervasive System Security
  Sicherheit in Pervasiven Systemen
Department: Faculty 1 - Mathematics, Computer Science, Physics, Electrical Engineering and Information Technology
Responsible Staff Member:
  • Prof. Dr. rer. nat. Langendörfer, Peter
Language of Teaching / Examination:English
Duration:1 semester
Frequency of Offer: Every winter semester
Credits: 6
Learning Outcome:Upon completion of the module, students will know the basics of security in pervasive systems. They will know the different fields of work in which the systems are used, such as telemedicine and homeland security. They are able to identify security requirements and threats to privacy. They understand how the means presented are used to ensure security requirements. They are able to apply different algorithms in the field. They will be able to analyze security protocols and analyze their weaknesses.
Contents:This lecture introduces different kinds of pervasive systems considering diverse application areas such as telemedicine and homeland security. These examples are used to elaborate security and privacy requirements as well as threats against these goals. Then means ensuring the security goals will be introduced, here a clear focus is on cryptographic systems as the means of implementing security goals. Selected security protocols e.g. for key exchange, digital signature generation/verification, etc. will be discussed taking into account their limitations and means to successfully attack those protocols.
Topics covered include in particular:
  • Topology, functionality and limitations of pervasive systems in different application areas.
  • Symmetric and asymmetric cryptosystems
  • Security protocols for key exchange
  • Generation and verification of digital signatures
  • Security aspects in the algorithms and their implementations
  • Security vulnerabilities of the protocols and possible attack targets
  • Privacy protection issues
  • Physical attacks and their classification
  • Side channel attacks (SCA) on encryption means and appropriate countermeasures
  • Physical processes exploited for SCA; basics of measurement
  • Fault injection (FI) attacks, physical basics and suitable countermeasures
Recommended Prerequisites:Knowledge of the content of the modules
  • 11454: Introduction to Computer Networks
  • 12864: Wireless Sensornetworks: Concepts, Protocolls and Applications
as well as basics in mathematics and physics.
Mandatory Prerequisites:None
Forms of Teaching and Proportion:
  • Lecture / 2 Hours per Week per Semester
  • Exercise / 1 Hours per Week per Semester
  • Self organised studies / 135 Hours
Teaching Materials and Literature:
  • Paar, C., Pelzl, J. (2010): Understanding Cryptography - A Textbook for Students and Practitioners, Springer
  • Schneier, Bruce (1996): Applied Cryptography : Protocols, Algorithms, and Source Code in C,  Wiley
  • F. Koeune, F. Standaert (2005): A Tutorial on Physical Security and Side-Channel Attacks, Springer
  • Ross Anderson (2020): Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Wiley
Module Examination:Prerequisite + Final Module Examination (MAP)
Assessment Mode for Module Examination:Prerequisite:
  • Successful completion of exercise assignments
Final module examination:
  • Written examination, 90 min. OR
  • Oral examination, 30 min. (with small number of participants)
In the first lecture it will be anounced, if the examination will be offered in written or oral form.
Evaluation of Module Examination:Performance Verification – graded
Limited Number of Participants:None
Part of the Study Programme:
  • Abschluss im Ausland / Cyber Security / keine PO
  • Master (research-oriented) / Cyber Security / PO 2017
  • Abschluss im Ausland / Informatik / keine PO
  • Master (research-oriented) / Informatik / PO 2008
  • Master (research-oriented) / Informations- und Medientechnik / PO 2017
  • Master (research-oriented) / Künstliche Intelligenz Technologie / PO 2022
Remarks:
  • Study programme Informatik M.Sc.: Compulsory elective module in "Angewandte und technische Informatik" (level 400)
  • Study programme Cyber Security M.Sc.: Compulsory elective module in complex "Cyber Security Methods"
  • Study programme  Künstliche Intelligenz Technologie M.Sc.: Compulsory elective module in complex „Software-basierte Systeme“
Module Components:Lecture: Pervasive System Security
Accompanying exercises
Components to be offered in the Current Semester:
  • no assignment