{"id":54933,"date":"2023-08-27T04:01:13","date_gmt":"2023-08-27T04:01:13","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/cel344-iot-security-syllabus-for-eie-2021-regulation-professional-elective-ii\/"},"modified":"2023-08-27T04:01:13","modified_gmt":"2023-08-27T04:01:13","slug":"cel344-iot-security-syllabus-for-eie-2021-regulation-professional-elective-ii","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/cel344-iot-security-syllabus-for-eie-2021-regulation-professional-elective-ii\/","title":{"rendered":"CEl344: IoT Security syllabus for EIE 2021 regulation (Professional Elective-II)"},"content":{"rendered":"<p align=\"justify\">IoT Security detailed syllabus for Electronics &amp; Instrumentation Engineering (EIE) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna Universities<\/a> official website and presented for the EIE students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Electronics &amp; Instrumentation Engineering 5th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/eie-5th-sem-syllabus-2021-regulation\">EIE 5th Sem 2021 regulation scheme<\/a>. For Professional Elective-II scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/professional-elective-ii-syllabus-for-eie-2021-regulation\">EIE Professional Elective-II syllabus scheme<\/a>. The detailed syllabus of iot security is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit I<\/h4>\n<p>INTRODUCTION<br \/>\nIntroduction to IoT Security &#8211; Vulnerabilities, Attacks and Countermeasures. Information Assurance. Attack types. New security threats and vulnerabilities. Fault Trees and CPS. Threat Modeling. Attack, Defense, and Network Robustness of Internet of Things, A Solution-Based Analysis of Attack Vectors on Smart Home Systems.\n<\/p>\n<p><h4>Unit II<\/h4>\n<p>SECURITY MANAGEMENT &amp; CRYPTOLOGY<br \/>\nBuilding security in to design and development, Safety and security design, Security Management and Cryptology- Security Controls &#8211; Authentication, Confidentiality, Integrity; Access Control, Key Management, Communication and messaging Protocols, Cipher -Symmetric Key Algorithms, Public Private Key Cryptography; Attacks &#8211; Dictionary and Brute Force, Lookup Tables, Reverse Look Tables, Rainbow Tables, Hashing &#8211; MDS,SHA 256  SHA 512, Ripe MD, WI, Data Mining,.\n<\/p>\n<p><h4>Unit III<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit IV<\/h4>\n<p>IoT PROTOCOLS<br \/>\nIoT Protocol Built-in Security Features &#8211; Transport Layer, COAP, UDP, TCP, MQTT, SSL\/TLS, DTLS, LIGHT WEIGHT M2M, XMPP, Zigbee, LoRa, BLE, Kerberos, Cloud security for IoT.\n<\/p>\n<p><h4>Unit V<\/h4>\n<p>IoT APPLICATIONS<br \/>\nCase Studies and Discussion: Smart Agriculture, Cities, Grid, Healthcare, Smart Homes, smart street lighting, Smart building, Smart parking, smart irrigation, Supply Chain, and Transportation, Application of Security Concepts to Create IoT system.<\/p>\n<p><h4>Skill Development Activities<\/h4>\n<p>(Group Seminar\/Mini Project\/Assignment\/ 5<br \/>\nContent Preparation \/ Quiz\/ Surprise Test \/ Solving GATE questions\/ etc)<br \/>\n1\tNeeded to grasp business intelligence include sensor data analysis, data center . management, predictive analytics, and programming in Hadoop and NoSQL.<\/p>\n<ol>\n<li>Knowledge in UX and UI Design<\/li>\n<li>Develop well-versed in both iOS and Android app development<\/li>\n<li>Ability to program interfaces such as GPIO and I2C<\/li>\n<li>Should have basic OSI stack knowledge, especially connectivity protocols<\/li>\n<li>Ability to connect automatic API testing with manual testing<\/li>\n<li>Ability to read and interpret data meaningfully in healthcare.<\/li>\n<li>Familiar with machine learning and AI.<\/li>\n<li>cognizant of changes in programming languages and evolving hardware platforms.<\/li>\n<\/ol>\n<p><h4>Course Outcomes:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>Brian Russell, Drew Van Duren, \u00ef\u00bf\u00bdPractical Internet of Things Security\u00ef\u00bf\u00bd, Packt Publishing Limited, 2nd Edition,2018.<\/li>\n<li>Fei Hu, \u00ef\u00bf\u00bdSecurity and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations,\u00ef\u00bf\u00bd CRC Press (Taylor &amp; Francis Group), 2016, ISBN:978-1-4987-23190.<\/li>\n<li>Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler, \u00ef\u00bf\u00bdDemystifying Internet of Things Security\u00ef\u00bf\u00bd, 2020.<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>Shancang Li and Li Da Xu, \u00ef\u00bf\u00bdSecuring the Internet of Things\u00ef\u00bf\u00bd, Elsevier, 2017.<\/li>\n<li>Sridipta Misra, Muthucumaru Maheswaran, Salman Hashmi, \u00ef\u00bf\u00bdSecurity Challenges and Approaches in Internet of Things,\u00ef\u00bf\u00bd Springer, 2016.<\/li>\n<li>Arshdeep Bahga, Vijay Madisetti, \u00ef\u00bf\u00bdInternet of Things &#8211; A Hands-on approach,\u00ef\u00bf\u00bd VPT Publishers, 2014, ISBN:78-0996025515.<\/li>\n<li>IoT PROTOCOLS &#8211; https:\/\/www.avsystem.com\/blog\/iot-protocols-and-standards\/<\/li>\n<li>IoT APPLICATIONS &#8211; https:\/\/www.jigsawacademy.com\/top-uses-of-iot\/<\/li>\n<\/ol>\n<p><h4>List of Open Source Software\/ Learning Website:<\/h4>\n<ol>\n<li>https:\/\/www.cybrary.it\/course\/iot-security\/<\/li>\n<li>https:\/\/www.udemy.com\/course\/hacking-iot\/<\/li>\n<li>https:\/\/www.edx.org\/course\/cybersecurity-and-privacy-in-the-iot<\/li>\n<li>https:\/\/www.netacad.com\/courses\/cybersecurity\/iot-security<\/li>\n<li>https:\/\/stalwartlearning.com\/iot-security\/#1571760778613-fb76c66d-5ce2f2dc-0b723b65-c1c6<\/li>\n<li>loT Security Software: Quantum Armor, Azure loT Hub, AWS loT, SonicWall Capture Client, nuPSYS, Forescout, Sectrio, Microsoft defender for IoT, Cruz IoT Device Director, OverWatch, Google cloud IoT core, Darktrace, EJBCA, DxOdyssey, Cisco cyber vision, Tempered etc&#8230;<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all the other subjects of Electronics &amp; Instrumentation Engineering 5th Sem, visit <a class=\"rank-math-link\" href=\"..\/category\/eie+5th-sem\">EIE 5th Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Electronics &amp; Instrumentation Engineering results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University EIE all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>IoT Security detailed syllabus for Electronics &amp; Instrumentation Engineering (EIE) for 2021 regulation curriculum has been taken from the Anna Universities official website and presented for the EIE students. For [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[75],"tags":[],"class_list":["post-54933","post","type-post","status-publish","format-standard","hentry","category-eie"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/54933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=54933"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/54933\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=54933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=54933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=54933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}