Syllabus IoT Security
Syllabus IoT Security
IoT, Semester-II
Course Code
Course Title IoT Security
COURSE OUTCOME
At the end of successful completion of the course, students will be able to:
COURSE CONTENTS
Module I Introduction to Operational Technology (OT)
Overview of industrial control systems (ICS), ICS operation & components,
Perdue model, SCADA systems, Cyber-physical systems (CPS) & IoT
Module II IoT Vulnerabilities, Threats & Risks
STRIDE methodology, OWASP Iot vulnerabilities, Privacy & trust,
Insufficient authentication/authorization, Insufficient access control, Attacks
on IoT data, Attacks on IoT layered architecture, Security concerns in IoT
applications, Security concerns in SCADA
Module III IoT Pen testing
Active vulnerability analysis tools, Port scanning, Operating system
fingerprinting and version scanning, Penetration testing, Attack surface
mapping
Module IV Exploitation Tools & Frameworks
Exploitation using I2C & SPI, JTAG debugging and exploitation, Boundary
scan, Test access ports
Module V Firmware Reverse Engineering
Understanding firmware, Extracting firmware, Manual firmware extraction,
Automated file system extraction, Firmware internals, Backdooring a
firmware, Static & dynamic analysis
Module VI Radio & Side Channel Attacks
Software defined radio, Exploiting ZIGBEE & BLE, Power analysis attack,
Invasive attack, Perturbation -attacks, Electromagnetic side channel attack,
fault injection attack, timing attack, covert channel attacks
Text Books:
1.
Elsevier, 2017
2.
3.
Packt Publishing, 2016
Additional Material:
1. Research papers
Programme Name M. Tech. IoT, Semester-II
Course Code
Course Title IoT Security (LAB)
COURSE OUTCOME
At the end of successful completion of the course, students will be able to:
COURSE CONTENTS
Module I Introduction to Operational Technology (OT)
Capture and Analyse system network traffic
Module II IoT Vulnerabilities, Threats & Risks
Perform foot printing, information gathering using various foot printing
tools
Module III IoT Pen testing
Use Metasploit framework to exploit SCADA system
Module IV Exploitation Tools & Frameworks
Firmware exploitation using Jtag debugger port
Module V Firmware Reverse Engineering
Static firmware analysis
Module VI Radio & Side Channel Attacks
Dynamic Firmware Analysis; Side channel Attack
Text Books:
1.
Elsevier, 2017
2.
3.
Packt Publishing, 2016
Additional Material:
1. Research papers