Information on individual educational components (ECTS-Course descriptions) per semester

Architectures and Security in Distributed Systems

Degree programme Computer Science
Subject area Engineering Technology
Type of degree Master
Full-time
Summer Semester 2025
Course unit title Architectures and Security in Distributed Systems
Course unit code 024913120406
Language of instruction English
Type of course unit (compulsory, optional) Elective
Teaching hours per week 2
Year of study 2025
Level of the course / module according to the curriculum
Number of ECTS credits allocated 4
Name of lecturer(s) Armin SIMMA
Requirements and Prerequisites

Knowledge of computer networks.

Basic knowledge of cryptology and security goals.

Basic knowledge of operating systems including handling the Linux command line; Basic knowledge of Linux and Windows command line commands. Basic ability to write a Linux script.

Basic programming knowledge (C, Java) and the ability to learn another programming language (at least the basics) yourself (e.g. Python, Perl)

Course content

The starting point are architectures for IoT systems, which consist of small and micro devices, active and passive communication infrastructure and a complex server landscape in the background system

  • Cloud computing, edge computing, fog computing
  • Message-based, stream-oriented, etc. architectures (e.g. MQTT, Apache Kafka), practical application
  • Communication strategies (publish / subscribe, client / server, ...) and quality of service
  • Transfer protocols for networking: CoAP, REST, Web Sockets
  • Always On Architectures: Partial / Incidental On
  • Effects of the architectures on resources (power, throughput, costs, ...) and vice versa

Security:

The following content relates to IoT / distributed systems, even if not explicitly stated.

  • IoT security architectures
  • Specific security challenges / goals / requirements for IoT / distributed systems
  • Specific threats to IoT / distributed systems
  • Best practices for IoT security
  • Norms and standards
  • Cryptology and cryptological applications in the field of IoT / distributed systems
  • Trust and Trusted Computing (TPM); Trusted Execution Environments TEE; Secure elements;
  • Secure Boot
  • Clear and secure proof of identity for products, processes and machines
  • Key management in the field of IoT (including hardware-based solutions)
  • Micro-segmentation
Learning outcomes

The students

  • know current design patterns for software architectures of distributed systems
  • can make a well-founded selection for their use
  • know current threats and consider the security goals in the draft
  • can implement the design patterns with the appropriate frameworks
  • can implement countermeasures against current threats in practice
  • know best practices in the field of IoT / distributed systems and can implement them
Planned learning activities and teaching methods

Lecture with exercises on the individual architectures; Lecture and case study on safety in teams of two.

Assessment methods and criteria

Evaluation of the exercises 10%

Writen exam 40%

Writen exam 50%

For a positive grade, a minimum of 50% of the possible points must be achieved in each part of the examination.

Comment

None

Recommended or required reading
  • Butun, Ismail (2020): Industrial IoT: Challenges, Design Principles, Applications, and Security. 1st ed. 2020 edition. Cham: Springer.
  • Pal, Shantanu et al. (2020): ‘Security Requirements for the Internet of Things: A Systematic Approach.’ In: Sensors, 20 (2020), 20. Available at: https://doi.org/10.3390/s20205897
Mode of delivery (face-to-face, distance learning)

Face-to-face event with selected online elements