|
Security and Privacy in Pervasive Computing (SecPriPC)
- Lecturer
- Dr. rer. nat. Zinaida Benenson
- Details
- Vorlesung
2 cred.h, Sprache Deutsch oder Englisch
Time and place: Fri 10:15 - 11:45, 00.152-113; comments on time and place: First Lecture AND first Exercise will take place on Friday, 24.10. starting at 8:30 because of the building activities (Baumaßnahmen) in the "blue tower" (Blaues Hochhaus).
starting 24.10.2014
- Fields of study
- WPF INF-BA-V-SEC ab 3 (ECTS-Credits: 2,5)
WF INF-MA ab 1 (ECTS-Credits: 2,5)
- Prerequisites / Organisational information
- Important: First Lecture AND first Exercise will take place on Friday, 24.10. starting at 8:30 because of the building activities (Baumaßnahmen) in the "blue tower" (Blaues Hochhaus).
- Contents
- Pervasive Computing, also called Ubiquitous Computing, is a computing paradigm that comprises billions computing devices integrated into everyday objects and connected into a global communication network that is orders of magnitude larger than the Internet today. These devices measure environmental characteristics, exchange information about their surroundings and interact with people in many different ways, such that sometimes people may be even unaware that they are using computers. The era of pervasive computing has already started and moves on rapidly, integrating the Internet, smartphones, wearable computing devices (such as Google glass or Apple Watch), smart grid, home automation, intelligent cars and smart cities.
In this course we look at the visions and current scenarios of Pervasive Computing from the security and privacy point of view. We consider security mechanisms and privacy concerns of the present-day technologies, such as smartphone operating systems, GSM/UMTS, WLAN, Bluetooth, ZigBee, RFID, and also of present and envisioned systems and services such vehicular networks, sensor networks, location-based services and augmented reality. The students achieve the main module goals if they are able to:
recognize existing and future computing systems as pervasive through analysis of their conceptual design and development, deployment and actual usage
critically appraise pervasive computing systems for typical security- and privacy-related concerns and weaknesses in design, deployment and usage
choose appropriate techniques and policies for securing pervasive computing systems
choose appropriate techniques and policies for addressing privacy issues in pervasive computing systems
The exercise comprises student presentations on selected topics, such as specific security and privacy mechanisms or specific attacks. Materials such as papers and key discussion questions will be provided. The students will be divided into groups, and each group will prepare a 25-minutes long presentation (possibly with a demo), and lead a 20-minutes long discussion with the class on a given topic. The exercise will also feature a number of guest talks by experts on current security and privacy issues in pervasive computing systems.
- Recommended literature
-
Other books and papers will be presented during the lecture.
- Additional information
- Expected participants: 25, Maximale Teilnehmerzahl: 25
Registration is required for this lecture. Registration starts on Thursday, 21.8.2014, 00:00 and lasts till Wednesday, 15.10.2014, 00:00 über: StudOn.
- Assigned lectures
- UE: Security and Privacy in Pervasive Computing - Übung
-
Lecturers: Dr. rer. nat. Zinaida Benenson, Lena Reinfelder, M. Sc.
Time and place: Fri 8:30 - 10:00, 00.152-113; comments on time and place: First Lecture AND first Exercise will take place on Friday, 24.10. starting at 8:30 because of the building activities (Baumaßnahmen) in the "blue tower" (Blaues Hochhaus).
- Verwendung in folgenden UnivIS-Modulen
- Startsemester WS 2014/2015:
- Security and Privacy in Pervasive Computing (SecPriPC)
- Department: Chair of Computer Science 1 (IT Security Infrastructures)
|
|
|