Security and Privacy in Pervasive Computing
Time and place
This module will be held in German, slides are in English. Exercise tasks will be formulated in English, and can be answered in both languages, German or English.
- Wed 16:15-17:45, Room 02.134-113 (exclude vac) ICS
Prerequisites / Organizational information
This module will be held in German, slides are in English. Exercise tasks will be formulated in English and can be answered in English or German.
Registration for the course happens over StudOn in the beginning of October.
Knowledge from the module "Angewandte IT Sicherheit" or comparable IT Security module is required, for example: security goals (CIA), symmetric and asymmetric cryptography principles, PKI, basic functionality of SSL.
Pervasive Computing, also called Ubiquitous Computing, is a computing paradigm that comprises billions computing devices integrated into everyday objects and connected into a global communication network that is orders of magnitude larger than the Internet today. These devices measure environmental characteristics, exchange information about their surroundings and interact with people in many different ways, such that sometimes people may be even unaware that they are using computers. The era of pervasive computing has already started and moves on rapidly, integrating the Internet, smartphones, wearable computing devices (such as Google glass or Apple Watch), smart grid, home automation, intelligent cars and smart cities. In this course we look at the visions and current scenarios of Pervasive Computing from the security and privacy point of view. We consider security mechanisms and privacy concerns of the present-day technologies, such as smartphone operating systems, GSM/UMTS, WLAN, Bluetooth, ZigBee, RFID, and also of present and envisioned systems and services such vehicular networks, sensor networks, location-based services and augmented reality. The students achieve the *main module goals* if they are able to: - recognize existing and future computing systems as pervasive through analysis of their conceptual design and development, deployment and actual usage - critically appraise pervasive computing systems for typical security- and privacy-related concerns and weaknesses in design, deployment and usage - choose appropriate techniques and policies for securing pervasive computing systems - choose appropriate techniques and policies for addressing privacy issues in pervasive computing systems The *exercise* comprises (1) practical tasks on specific attacks, such as eavesdropping on WiFi or ZigBee communication, and (2) guest talks on selected topics, for example, NFC security. For practical exercises, students will be divided into groups, and each group will have to execute the tasks in our lab and write a report about their work for each task. Further details will be communicated in the first exercise. (automatisch geplant, erwartete Hörerzahl original: 0, fixe Veranstaltung: nein)
Expected participants: 30