Information on individual educational components (ECTS-Course descriptions) per semester

Architectures and Security in Distributed Systems

Degree programme Computer Science
Subject area Engineering & Technology
Type of degree Master
Full-time
Summer Semester 2025
Course unit title Architectures and Security in Distributed Systems
Course unit code 024913120406
Language of instruction English
Type of course unit (compulsory, optional) Elective
Teaching hours per week 2
Year of study 2025
Level of the course / module according to the curriculum
Number of ECTS credits allocated 4
Name of lecturer(s) Armin SIMMA
Requirements and Prerequisites

Knowledge of computer networks.

Basic knowledge of cryptology and security goals.

Basic knowledge of operating systems including handling the Linux command line; Basic knowledge of Linux and Windows command line commands. Basic ability to write a Linux script.

Basic programming knowledge (C, Java) and the ability to learn another programming language (at least the basics) yourself (e.g. Python, Perl)


Course content

The following content relates to IoT / distributed systems, even if not explicitly stated.

  • Specific security challenges / goals / requirements for IoT / distributed systems
  • Specific threats to IoT / distributed systems
  • Best practices for IoT security
  • IoT security architectures
  • Norms and standards
  • Cryptology and cryptological applications in the field of IoT / distributed systems
  • Trust and Trusted Computing ; Trusted Execution Environments TEE; Secure elements;
  • Secure Boot
  • Clear and secure proof of identity for products, processes and machines
  • Key management in the field of IoT (including hardware-based solutions)
  • Practical labs with a Trusted Platform Module (TPM)
Learning outcomes

The students

  • know the difference between the security requirements of IoT versus IT systems
  • know current threats and consider the security goals of distributed and IoT systems
  • can implement countermeasures against current threats in practice
  • know best practices in the field of IoT / distributed systems and can implement them
  • know Trusted Computing technologies 
  • are able to implement basic scripts to work with a trusted platform modul
Planned learning activities and teaching methods

Lecture with labs: working with a simulated Trusted Platform Module

Assessment methods and criteria

Evaluation of the exercises 20%

Writen exam 80%

For a positive grade, a minimum of 50% of the possible points must be achieved in each part of the examination.

Comment

None

Recommended or required reading
  • Pal, Shantanu et al. (2020): ‘Security Requirements for the Internet of Things: A Systematic Approach.’ In: Sensors, 20 (2020), 20. Available at: https://doi.org/10.3390/s20205897
  • Koen Tange et al: "A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities", 2020, IEEE
  • Will Arthur, David Challener: "A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security", 2015
Mode of delivery (face-to-face, distance learning)

Face-to-face event with selected online elements