[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Comprehensive Open-Source SCA Course Modules for Hands-On IoT Security Education

  • Conference paper
  • First Online:
Internet of Things. IoT through a Multi-disciplinary Perspective (IFIPIoT 2022)

Abstract

With the rapid growth of the Internet of Things (IoT) and increasing reliance on network-connected devices, IoT security, which integrates components of hardware and cybersecurity, is more important than ever. Hence, we must improve and expand training opportunities for students in IoT security. Experiential learning is an essential component of education for engineering and cybersecurity in particular. In this work, we describe three comprehensive hands-on IoT security experiments built using off-the-shelf development boards which can provide a low-cost and accessible experiential learning opportunity for students in this area.

This material is based upon work supported by the National Science Foundation under Grant No. DGE-1954259. Contact: rkaram@usf.edu.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abdullah, A., Hamad, R., Abdulrahman, M., Moala, H., Elkhediri, S.: CyberSecurity: a review of internet of things (IoT) security issues, challenges and techniques. In: 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6. IEEE (2019). https://doi.org/10.1109/CAIS.2019.8769560

  2. Al-Emran, M., Malik, S.I., Al-Kabi, M.N.: A survey of internet of things (IoT) in education: opportunities and challenges. In: Hassanien, A.E., Bhatnagar, R., Khalifa, N.E.M., Taha, M.H.N. (eds.) Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications. SCI, vol. 846, pp. 197–209. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-24513-9_12

    Chapter  Google Scholar 

  3. Albiol, P., Manich, S., Arumí, D., Rodríguez-Montañés, R., Gómez-Pau, A.: Low cost AES protection against DPA using rolling codes. In: 2021 XXXVI Conference on Design of Circuits and Integrated Systems (DCIS), pp. 1–6 (2021). https://doi.org/10.1109/DCIS53048.2021.9666192

  4. Aljuffri, A., Reinbrecht, C., Hamdioui, S., Taouil, M.: Multi-bit blinding: a countermeasure for RSA against side channel attacks. In: IEEE 39th VLSI Test Symposium (VTS), pp. 1–6 (2021). https://doi.org/10.1109/VTS50974.2021.9441035

  5. Arias, O., Wurm, J., Hoang, K., Jin, Y.: Privacy and security in internet of things and wearable devices. IEEE Trans. Multi-Scale Comput. Syst. 1(2), 99–109 (2015). https://doi.org/10.1109/TMSCS.2015.2498605

    Article  Google Scholar 

  6. Atallah, M.: Faster image template matching in the sum of the absolute value of differences measure. IEEE Trans. Image Process. 10(4), 659–663 (2001). https://doi.org/10.1109/83.913600

    Article  MathSciNet  MATH  Google Scholar 

  7. Baker, S.B., Xiang, W., Atkinson, I.: Internet of things for smart healthcare: technologies, challenges, and opportunities. IEEE Access 5, 26521–26544 (2017). https://doi.org/10.1109/ACCESS.2017.2775180

    Article  Google Scholar 

  8. Desai, P., Bhandiwad, A., Shettar, A.S.: Impact of experiential learning on students’ success in undergraduate engineering. In: 2018 IEEE 18th Conference on Advanced Learning Technologies (ICALT), pp. 46–50 (2018). https://doi.org/10.1109/ICALT.2018.00018

  9. Dinesh Kumar, S., Thapliyal, H., Mohammad, A.: FinSAL: FinFET-based secure adiabatic logic for energy-efficient and DPA resistant IoT devices. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 37(1), 110–122 (2018). https://doi.org/10.1109/TCAD.2017.2685588

    Article  Google Scholar 

  10. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019). https://doi.org/10.1109/ACCESS.2019.2924045

    Article  Google Scholar 

  11. Kaneko, K., Ban, Y., Okamura, K.: A study on effective instructional design for IoT security education focusing on experiential learning. Int. J. Learn. Technol. Learn. Environ. 2(1), 1–18 (2019)

    Article  Google Scholar 

  12. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1_25

    Chapter  Google Scholar 

  13. Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_9

    Chapter  Google Scholar 

  14. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W.: A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017). https://doi.org/10.1109/JIOT.2017.2683200

    Article  Google Scholar 

  15. Lv, Z., Qiao, L., Kumar Singh, A., Wang, Q.: AI-empowered IoT security for smart cities. ACM Trans. Internet Technol. 21(4), 1–21 (2021). https://doi.org/10.1145/3406115

    Article  Google Scholar 

  16. Mantwill, F., Multhauf, V.: Application of agile experiential learning based on reverse engineering as support in product development. In: Krause, D., Heyden, E. (eds.) Design Methodology for Future Products, pp. 65–81. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-78368-6_4

    Chapter  Google Scholar 

  17. Mazumdar, B., Mukhopadhyay, D.: Construction of rotation symmetric S-boxes with high nonlinearity and improved DPA resistivity. IEEE Trans. Comput. 66(1), 59–72 (2017). https://doi.org/10.1109/TC.2016.2569410

    Article  MathSciNet  MATH  Google Scholar 

  18. Mohamad Noor, M.B., Hassan, W.H.: Current research on internet of things (IoT) security: a survey. Comput. Netw. 148, 283–294 (2019). https://doi.org/10.1016/j.comnet.2018.11.025

    Article  Google Scholar 

  19. O’Flynn, C., Chen, Z.D.: ChipWhisperer: an open-source platform for hardware embedded security research. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 243–260. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-10175-0_17

    Chapter  Google Scholar 

  20. Ramesh, C., et al.: FPGA side channel attacks without physical access. In: 2018 IEEE 26th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 45–52 (2018). https://doi.org/10.1109/FCCM.2018.00016

  21. Ramlowat, D.D., Pattanayak, B.K.: Exploring the internet of things (IoT) in education: a review. In: Satapathy, S.C., Bhateja, V., Somanah, R., Yang, X.-S., Senkerik, R. (eds.) Information Systems Design and Intelligent Applications. AISC, vol. 863, pp. 245–255. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-3338-5_23

    Chapter  Google Scholar 

  22. Rostami, M., Koushanfar, F., Karri, R.: A primer on hardware security: models, methods, and metrics. Proc. IEEE 102(8), 1283–1295 (2014). https://doi.org/10.1109/JPROC.2014.2335155

    Article  Google Scholar 

  23. Sarker, I.H., Khan, A.I., Abushark, Y.B., Alsolami, F.: Internet of things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mob. Netw. Appl. 1–17 (2022). https://doi.org/10.1007/s11036-022-01937-3

  24. Sidhu, S., Mohd, B.J., Hayajneh, T.: Hardware security in IoT devices with emphasis on hardware trojans. J. Sens. Actuat. Netw. 8(3), 42 (2019). https://doi.org/10.3390/jsan8030042

    Article  Google Scholar 

  25. Xu, T., Wendt, J.B., Potkonjak, M.: Security of IoT systems: design challenges and opportunities. In: 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), p. 417–423 (2014). https://doi.org/10.1109/ICCAD.2014.7001385

  26. Kolb, D.A.: Experiential Learning: Experience as the Source of Learning and Development. Pearson Education (2014). ISBN: 9780133892505

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mateus Augusto Fernandes Amador .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fernandes Amador, M.A., Olney, B., Katkoori, S., Karam, R. (2022). Comprehensive Open-Source SCA Course Modules for Hands-On IoT Security Education. In: Camarinha-Matos, L.M., Ribeiro, L., Strous, L. (eds) Internet of Things. IoT through a Multi-disciplinary Perspective. IFIPIoT 2022. IFIP Advances in Information and Communication Technology, vol 665. Springer, Cham. https://doi.org/10.1007/978-3-031-18872-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-18872-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-18871-8

  • Online ISBN: 978-3-031-18872-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics