Single-Course Dansk 5 ECTS

Security in Embedded Systems

Overall Course Objectives

To provide a basic understanding of theory and practice in the construction of secure communication and integrity in embedded systems.

See course description in Danish

Learning Objectives

  • Understand how the architecture of an embedded system consisting of several components influences the determination of the security demands the system.
  • Describe important characteristics of cryptographic algorithms and protocols and their use when communicating between embedded systems.
  • Describe the fundamental safety characteristics: Confidentiality, Integrity and Availability, as well as the importance of these when communicating between embedded systems.
  • Catagorize different classes of mechanisms and protocols to authenticate communication between elements in an embedded system.
  • Explain the possible uses of “Trusted Computing” techniques and technologies in the construction of secure embedded systems.
  • Explain the importance of physical security in a given embedded system in order to identify the impact of physical distribution of the system’s elements.
  • Analyzing an embedded system consisting of several components, in order to identify risks, threat models and attack models.
  • Choose an appropriate implementation paradigm to satisfy given design requirements for data security in an embedded system.
  • Develop an overall design of a security architecture for an embedded system based on the interfaces and communication protocols of selected elements.
  • Develop a partial implementation of the security architecture of an embedded system based on an informal description of the function and purpose of the system.

Course Content

Fundamental characteristics of secure communications in embedded systems:
– Cryptographic Algorithms and Protocols
   (including Key Management and Lightweight Cryptography)
– Important Safety Properties
   (including Confidentiality, Integrity, Availability, Authenticity and Privacy)
– Authentication Mechanisms and Protocols
– “Trusted Computing”
   (including concepts such as Trusted Platform Modules and Trust Zones)
– Signed Software
   (including Signature Validation and Public Key Infrastructures)
– Physical Security and Distribution of Elements in an Embedded System
– Data Security
   (including Secure Data Storage – locally and in the Cloud – as well as Secure Data Reporting)
– Sustainability
(including a focus on minimal resource consumption)

Recommended prerequisites

02325/62577/62443/62581

Teaching Method

Lectures and exercises

Faculty

Remarks

Section of AI, Mathematics and Software
Computer Engineering: 4. semester
Elective: Software Technology, Healthcare Technology, Electrical Engineering

Limited number of seats

Maximum: 60.

Please be aware that this course has a limited number of seats available. If there are too many applicants, a pool will be created for the remainder of the qualified applicants, and they will be selected at random. You will be informed 8 days before the start of the course, whether you have been allocated a spot.

See course in the course database.

Registration

Language

Dansk

Duration

13 weeks

Institute

Engineering Technology

Place

DTU Ballerup Campus

Compute
Course code 62575
Course type Graduate Engineer
Semester start Week 6
Semester end Week 20
Days Wed 13-17
Price

9.250,00 DKK

Please note that this course has participants limitation. Read more

Registration