Podcast
Questions and Answers
What year was the Internet of Things (IoT) concept proposed by the Auto-ID lab of the MIT?
What year was the Internet of Things (IoT) concept proposed by the Auto-ID lab of the MIT?
1999
What does RFID stand for in the context of IoT?
What does RFID stand for in the context of IoT?
Radio Frequency Identification
What is the main function of sensors in the context of IoT?
What is the main function of sensors in the context of IoT?
- To collect and process data (correct)
- To track and identify data of things
- To connect and interact with smaller things
- To enhance the power of the network by developing processing capabilities
What does 'smart tech' aim to accomplish in the context of IoT?
What does 'smart tech' aim to accomplish in the context of IoT?
What does 'nanotech' aim to do in the context of IoT?
What does 'nanotech' aim to do in the context of IoT?
According to the document, which of these is NOT considered a driving aspect of the IoT?
According to the document, which of these is NOT considered a driving aspect of the IoT?
What is the term used to describe the integration of physical, digital, and human systems in a built environment to create a sustainable future?
What is the term used to describe the integration of physical, digital, and human systems in a built environment to create a sustainable future?
Cyber-physical Systems (CPS) were developed before the Internet of Things (IoT).
Cyber-physical Systems (CPS) were developed before the Internet of Things (IoT).
Which of these is NOT a notable example of a Cyber-physical System (CPS)?
Which of these is NOT a notable example of a Cyber-physical System (CPS)?
The distinction between IoT security and CPS security is clearly defined and agreed upon.
The distinction between IoT security and CPS security is clearly defined and agreed upon.
Which of these is NOT a question that arises when considering security and privacy in the IoT?
Which of these is NOT a question that arises when considering security and privacy in the IoT?
Which of the following questions is NOT related to privacy concerns in the context of mobile/IoT devices?
Which of the following questions is NOT related to privacy concerns in the context of mobile/IoT devices?
Flashcards
Internet of Things (IoT)
Internet of Things (IoT)
A network of interconnected devices, systems, and sensors that can collect, exchange, and process data.
Security of Distributed Systems and the IoT (SecDSIoT)
Security of Distributed Systems and the IoT (SecDSIoT)
The application of security principles and techniques to networked environments, including connected systems, CPS, and IoT.
Cyber-Physical System (CPS)
Cyber-Physical System (CPS)
A system that integrates physical processes with computational capabilities, often involving real-time control and interaction with the environment.
IoT - Connected Systems
IoT - Connected Systems
Signup and view all the flashcards
IoT - Cyber-Physical Systems (CPS)
IoT - Cyber-Physical Systems (CPS)
Signup and view all the flashcards
Security of Cyber-Physical Production Systems
Security of Cyber-Physical Production Systems
Signup and view all the flashcards
Security of Distributed Systems and the IoT (SecDSIoT)
Security of Distributed Systems and the IoT (SecDSIoT)
Signup and view all the flashcards
Privacy and the IoT
Privacy and the IoT
Signup and view all the flashcards
Device Fingerprinting
Device Fingerprinting
Signup and view all the flashcards
Trustworthiness of Sensor Data
Trustworthiness of Sensor Data
Signup and view all the flashcards
Impact of Manipulated Information in CPS
Impact of Manipulated Information in CPS
Signup and view all the flashcards
Safety-Related Threats in CPS
Safety-Related Threats in CPS
Signup and view all the flashcards
Monitoring Individuals with Mobile/IoT Devices
Monitoring Individuals with Mobile/IoT Devices
Signup and view all the flashcards
Information Leakage in Interconnected IoT Components
Information Leakage in Interconnected IoT Components
Signup and view all the flashcards
Behavioral Changes under Surveillance
Behavioral Changes under Surveillance
Signup and view all the flashcards
Formal Methods and Reliability
Formal Methods and Reliability
Signup and view all the flashcards
Usable Security
Usable Security
Signup and view all the flashcards
Smart City
Smart City
Signup and view all the flashcards
Smart City
Smart City
Signup and view all the flashcards
Smart City
Smart City
Signup and view all the flashcards
RFID
RFID
Signup and view all the flashcards
Sensors
Sensors
Signup and view all the flashcards
Smart Technologies
Smart Technologies
Signup and view all the flashcards
Nanotechnology
Nanotechnology
Signup and view all the flashcards
Personal Data
Personal Data
Signup and view all the flashcards
Cyber Threat Intelligence
Cyber Threat Intelligence
Signup and view all the flashcards
Darkweb
Darkweb
Signup and view all the flashcards
Industrial Control Systems (ICS)
Industrial Control Systems (ICS)
Signup and view all the flashcards
Cryptography
Cryptography
Signup and view all the flashcards
Automated Building System
Automated Building System
Signup and view all the flashcards
Risk Assessment
Risk Assessment
Signup and view all the flashcards
Risk
Risk
Signup and view all the flashcards
Security
Security
Signup and view all the flashcards
Availability
Availability
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Authentication
Authentication
Signup and view all the flashcards
Study Notes
Introduction to Distributed Systems and IoT Security
- The course is on the security of distributed systems and the Internet of Things (IoT)
- The instructor is Professor Dr. Steffen Wendzel and his team
- The course is part of Hochschule Worms' summer term 2024
- Online resources for the course are available in German and English
Security of Distributed Systems and the IoT (SecDSIoT)
- SecDSIoT concerns the security of networked environments, including connected systems, cyber-physical systems (CPS), and the IoT.
- The course requires a fundamental understanding of information security and mathematics.
- Essential security concepts, like risk, anonymity, confidentiality, availability, and integrity, are assumed prior knowledge.
- Students should review InfoSec fundamentals if unfamiliar with these topics.
Structure of the Class
- The course structure is dynamic, adapting throughout the semester.
- Not all material will be presented on slides; some content will be delivered using the whiteboard.
- Class topics include introduction to the topic, standardization, certification, organizational aspects, risk, cyber threat intelligence, cryptography, automated building security, industrial control systems security, formal methods, and human aspects of information security (usable security).
What is the IoT?
- The Internet of Things (IoT) concept was proposed in 1999 by the MIT Auto-ID lab.
- Key IoT driving aspects include Radio-Frequency Identification (RFID), sensors, smart technologies, and nanotechnologies, enabling new services.
- RFID is for tracking and identifying data of things
- Sensors collect and process data and detect changes in the physical status of things.
- Smart technologies enhance network capabilities across various network parts.
- Nanotechnologies connect and interact with smaller things.
- There's a view of everything being connected, indistinguishable between physical and virtual entities.
- Protection is a considerable challenge in an IoT environment.
What is the IoT? - Smart Cities
- A recurring term in IoT discussions is "smart city"; defined as integrating physical, digital, and human systems within urban environments for sustainability, prosperity, and inclusiveness.
What is the IoT? - CPS
- Cyber-physical systems (CPS) combine computation with physical processes.
- Examples include smart homes/buildings, industrial control systems (ICS), electronic healthcare equipment, wearables, and smart cars.
What is the IoT? - IoT = CPS
- There's ongoing debate about the relationship between IoT and CPS, with views including partial overlap, equivalence, or different subsets.
- This course won't differentiate between IoT and CPS security.
Security & Privacy in the IoT
- Security and privacy are significant considerations in IoT and CPS.
- Key questions include evaluating the trustworthiness of sensor data, ensuring actuator commands are unmodified, and if production control loops can handle internal manipulation.
- New potential safety concerns are also raised due to CPS.
Security of Mobile Systems
- Privacy is a major concern when considering IoT devices and mobile technology.
- Questions around privacy and data collection include if mobile/IoT devices can remotely monitor, conclusions from collected data types, data leakages between interconnected devices, and if individual behavior changes in response to monitoring awareness.
References
- A list of references for further reading is provided. These references are cited in the presentation for in-depth study.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.