IOT Concept Version-Introduction to Information and Cyber Security-Basic Terminologies-Standards and open-source Initiatives-CIA Traids: Effectively Addressing security and privacy concerns-Attacks Surfaces and vulnerabilities Device-network-gateway-cloud-Risk assessment and Management
IoT security (vulnerabilities, attacks and countermeasures)-Security Engineering for IoT Development-IoT security life cycle-Software –defined radios: SDR platforms-Hack RF and SDR/RTL,GNU Radio Companion (GRC)
Waveform Generator-Modulators-Instrumentation-Channel Models Filters-Fourier Analysis-Game theory foundations: Mixed-strategy-Nash equilibrium-repeated games-Bayesian games-coalitional games.
Applications of Cryptography in IoT Communication and data security-Threat modeling-Crypto foundations: Block ciphers-message integrity-authenticated encryption hash functions-Merkle trees-elliptic curves-public-key crypto (PKI)-signature algorithms Block chains: Crypto-currencies-Bitcoin P2P network-distributed consensus-incentives and proof-of-work-mining
Security Credential Management System (SCMS)-Vehicle-based security system (VBSS)-PKI Design-Certification Provisioning-Privacy by design-misbehavior detection-Revocation.
Reference Book:
1. Arvind Narayanan,”Bit Coin and CryptoCurrency Technologies”,Princeton University Press,2016,ISBN: 069117169
Text Book:
Brian Russell, Drew Van Duren, “Practical Internet of Things Security”,Kindle Edition,June 2016,ISBN: B01DPR2EM6