Architectures and Security in Distributed Systems
Degree programme | Computer Science |
Subject area | Engineering & Technology |
Type of degree | Master Full-time Summer Semester 2025 |
Course unit title | Architectures and Security in Distributed Systems |
Course unit code | 024913120406 |
Language of instruction | English |
Type of course unit (compulsory, optional) | Elective |
Teaching hours per week | 2 |
Year of study | 2025 |
Level of the course / module according to the curriculum | |
Number of ECTS credits allocated | 4 |
Name of lecturer(s) | Armin SIMMA |
Knowledge of computer networks.
Basic knowledge of cryptology and security goals.
Basic knowledge of operating systems including handling the Linux command line; Basic knowledge of Linux and Windows command line commands. Basic ability to write a Linux script.
Basic programming knowledge (C, Java) and the ability to learn another programming language (at least the basics) yourself (e.g. Python, Perl)
The following content relates to IoT / distributed systems, even if not explicitly stated.
- Specific security challenges / goals / requirements for IoT / distributed systems
- Specific threats to IoT / distributed systems
- Best practices for IoT security
- IoT security architectures
- Norms and standards
- Cryptology and cryptological applications in the field of IoT / distributed systems
- Trust and Trusted Computing ; Trusted Execution Environments TEE; Secure elements;
- Secure Boot
- Clear and secure proof of identity for products, processes and machines
- Key management in the field of IoT (including hardware-based solutions)
- Practical labs with a Trusted Platform Module (TPM)
The students
- know the difference between the security requirements of IoT versus IT systems
- know current threats and consider the security goals of distributed and IoT systems
- can implement countermeasures against current threats in practice
- know best practices in the field of IoT / distributed systems and can implement them
- know Trusted Computing technologies
- are able to implement basic scripts to work with a trusted platform modul
Lecture with labs: working with a simulated Trusted Platform Module
Evaluation of the exercises 20%
Writen exam 80%
For a positive grade, a minimum of 50% of the possible points must be achieved in each part of the examination.
None
- Pal, Shantanu et al. (2020): ‘Security Requirements for the Internet of Things: A Systematic Approach.’ In: Sensors, 20 (2020), 20. Available at: https://doi.org/10.3390/s20205897
- Koen Tange et al: "A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities", 2020, IEEE
- Will Arthur, David Challener: "A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security", 2015
Face-to-face event with selected online elements