Publication in the Diário da República: Despacho n.º 13495/2022 - 18/11/2022
10 ECTS; 1º Ano, 2º Semestre, 30,0 PL + 30,0 TP + 30,0 OT
- Luís Miguel Lopes de Oliveira
1 - Classify the technological components of the Internet of Things (IoT) ecosystem,
2 - Evaluate the medium access protocols in contemporary wireless standards for personal area networks.
3 - Design routing solutions, service discovery, and management protocols suitable for IoT ecosystems.
4 - Analyze the IoT ecosystem from a cybersecurity perspective
5 - Demonstrate and use computer-based tools to examine IoT network and security issues
6 - Implement exploitation and vulnerability mitigation techniques in IoT devices and systems.
7 - Identify and mitigate privacy threats related to IoT-based services.
1 - Network infraestrutures
1.1 - IoT enabling technologies, M2M communication technologies for IoT (BLE, IEEE 802.15.4 and LORA), 1.2 - 6LowPAN and RPL
1.3 - Protocols CoAP, MQTT and WebSocket
1.4 - Architectures for IoT data storage and processing: cloud/fog/edge computing
1.5 - IoT cloud platforms (AWS IoT, Watson IoT, etc.)
1.6 - Emerging IoT technologies
2 - Security
2.1 - Internet of Things (IoT) from a cybersecurity perspective
2.2 - Core IoT cybersecurity principles and technologies
2.3 - Device and sensor and communication technologies, vulnerabilities and mitigation
2.4 - Data, server, and cloud system vulnerabilities and mitigation
2.5 - Privacy and IoT
The assessment comprises two components: i) laboratory practice and ii) project. The practical component has a weight of 40% and consists in the assessment of practical work carried out throughout the semester, individually or in teams of students. The project component has a weight of 60%, and comprises the assessment of the project report and the oral presentation. The two components have a minimum score of 10 points. All assessment components are mandatory.
- AAbraham, A., & Mcheick, H. , J. (2019). Ubiquitous Computing and Computing Security of IoT. Amsterdam: Springer International Publishing.
Theoretical sessions to present and discuss the main concepts and laboratory sessions to solve real problems related with network infrastructures and security.
Software used in class