Module title: Security Systems for IoT

SCQF level: 10:
SCQF credit value: 20.00
ECTS credit value: 10

Module code: CSN10108
Module leader: Rameez Asif
School School of Computing
Subject area group: Computer Systems

Module Code CSN08102 and CSN09112
Module Title Practical Networks 2 and Network Security and Cryptography.

2018/9, Trimester 1, Face-to-Face,
Occurrence: 002
Primary mode of delivery: Face-to-Face
Location of delivery: MERCHISTON
Member of staff responsible for delivering module: Rameez Asif
Module Organiser:

Learning, Teaching and Assessment (LTA) Approach:
This is very much a hands-on approach to learning with a large proportion of the time devoted to the development of practical
and theoretical skills. This is intermixed with a lecture program that aims to introduce and develop the core principles of IoT
security systems. In general lectures are used to introduce advanced methods and techniques to provide data security in IoT
systems. The practical and tutorial work is then used to broaden and develop deeper understanding of the subject area. (LO1,
LO2, LO3). The module has a significant practical element in that 30% of the technical content will be delivered during lab
sessions in which students are expected to complete exercises involving system design, device programming and encryption
algorithms. A number of devices, platforms and software tools will be introduced during the course from different vendors
including but not limited to Google, Texas Instruments (TI), ARM, Matlab/Simulink and IBM.
Moodle is used as the central repository for all courseware and is used to encourage discussion forums on current module
issues as well as related topics and wider resources.

Formative Assessment:
Formative assessment takes place during the timetabled tutorial sessions where students are expected to present evidence of
practical work. Feedback is provided to students on a one-to-one basis through discussion during tutorial sessions with the
class tutor allowing individual strengths and weaknesses highlighted in timely fashion. The overall objective here is that any
remedial study can be put in place at the earliest possible point in the delivery of the module.

Summative Assessment:
Summative assessment is implemented through a combination of an exam and a practical coursework exercises:
The exam is scheduled to take place during week 14-15 and is a closed-book test with a duration of 90 minutes (LO2, 3). This
is an essay style exam.
Practical coursework (LO1, 3) requires the development of hardware and software interfaces. Some of this work is formally
supervised to ensure that progress is being made and that the work is of the correct standard. Feedback is routinely given to
all students on a one-to-one basis, and is delivered during the timetabled practical sessions. In practice, the coursework
progress is monitored at several points throughout its development with individual and group feedback provided though
ongoing discussions with the class tutor.

Student Activity (Notional Equivalent Study Hours (NESH))
Mode of activityLearning & Teaching ActivityNESH (Study Hours)
Face To Face Lecture 24
Face To Face Practical classes and workshops 24
Independent Learning Groupwork (Scheduled) 152
Total Study Hours200
Expected Total Study Hours for Module200

Type of Assessment Weighting % LOs covered Week due Length in Hours/Words
Practical Skills Assessment 60 1,3 10 HOURS= 0, WORDS= 3000
Centrally Time Tabled Examination 40 2,3 14/15 HOURS= 2, WORDS= 0
Component 1 subtotal: 60
Component 2 subtotal: 40
Module subtotal: 100

Description of module content:

In this module you will gain a solid technical introduction to the security protocols related to Internet of Things (IoT). This module discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the module covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT.
The module is broadly divided into two parts, namely development at the edge and development in the cloud. A systems engineering approach is adopted reviewing the key technologies employed at different levels of the IoT stack and how they are integrated to form complete IoT systems.
The future trends in IoT infrastructures, architectures and applications are also delivered. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems.

Learning Outcomes for module:

Upon completion of this module you will be able to
LO1: Design, implement, evaluate and critically analyse the vulnerability assessment of complex IoT systems.
LO2: Analyse and evaluate the key security architectures and authentication schemas.
LO3: Research and apply security algorithms to IoT applications to provide secure communication.

Indicative References and Reading List - URL: