HEAD
The objective of this course is to make students to learn how cyber security for the IoT works along with key technical details, process flows, definitions of terms and practical examples.
Fundamentals of encryption for cyber security: Cryptography – Need and the Mathematical basics- History of cryptography, symmetric ciphers, block ciphers, DES – AES. Public-key cryptography: RSA, Diffie-Hellman Algorithm, Elliptic Curve Cryptosystems, Algebraic structure, Triple Data Encryption Algorithm (TDEA) Block cipher.
IoT security framework : IOT security frame work, Security in hardware, Bootprocess, OS & Kernel, application, run time environment and containers. Need and methods of Edge Security, Network Security: Internet, Intranet, LAN, Wireless Networks, Wireless cellular networks, Cellular Networks and VOIP.
Elementary blocks of IoT Security & Models for Identity Management: Vulnerability of IoT and elementary blocks of IoT Security, Threat modeling – Key elements. Identity management Models and Identity management in IoT, Approaches using User-centric, Device-centric and Hybrid.
Identity Management and Trust Establishment: Trust management lifecycle, Identity and Trust, Web of trust models. Establishment: Cryptosystems – Mutual establishment phases – Comparison on security analysis. Identity management framework, Access Control in IoT and light weight cryptography: Capability-based access control schemes, Concepts, identity-based and identity-driven, Light weight cryptography, need and methods, IoT use cases
Security and Digital Identity in Cloud Computing: Security, Digital identity management in cloud, Classical solutions, alternative solutions, Management of privacy and personal data in Cloud; Cyber Crimes, Hackers and Forensics: Cyber Crimes and Laws – Hackers – Dealing with the rise tide of Cyber Crimes – Cyber Forensics and incident Response – Network Forensics.
John R. Vacca, “Computer and Information Security Handbook”, Elsevier, 2013.
Parikshit Narendra Mahalle , Poonam N. Railkar, “Identity Management for Internet of Things”, River Publishers, 2015.
William Stallings, “Cryptography and Network security: Principles and Practice”, 5th Edition, 2014, Pearson Education, India.
Maryline Laurent, SamiaBouzefrane, “Digital Identity Management”, Elsevier, 2015.
Joseph MiggaKizza, “Computer Network Security”, Springer, 2005.
Christof Paar and Jan Pelzl, “Understanding Cryptography – A Textbook for Students and Practitioners”, Springer, 2014.
Behrouz A.Forouzan : Cryptography & Network Security – The McGraw Hill Company, 2007.
Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: “Private Communication in a public World”, PTR Prentice Hall, Second Edition, 2002.
Alasdair Gilchrist, “IoT security Issues”, Oreilly publications, 2017.
On successful completion of this course the students will be able to-
Design and implement cryptography algorithms
Solve network security problems in various networks
Build security systems using elementary blocks
Build Trustable cloud based IoT systems
Solve IoT security problems using light weight cryptography and appreciate the need for cyber security laws and methods.
Describe the importance and objectives of an operating system and various services provided by the operating system.
Interpret the important functions of different modules of an Operating system, like process management, memory management, device management and file system, etc. and will be able to apply these concepts in given test cases.
Compare and contrast different policies of CPU scheduling, Inter-process Communication, Page replacement and disk scheduling algorithms etc.
Design and develop small modules, shell and utility programs using system calls of Linux or some educational operating system.
Silberschatz, Galvin, Gagne, “Operating System Concepts’’, Wiley,9 Edition.
William Stalling, “Operating Systems”, PearsonEducation,
Andrew S. Tanenbaum, “Modern Operating Systems”, 3/e, PrenticeHall
Maurice J. Bach, “ The Design of Unix Operating System”, Prentice Hall of India,
Bovet &Cesati, “Understanding the Linux Kernel”, O’Reily,2/E.
Write a program to implement FCFS CPU schedulingalgorithm.
Write a program to implement SJF CPU schedulingalgorithm.
Write a program to implement Priority CPU Schedulingalgorithm.
Write a program to implement Round Robin CPU schedulingalgorithm.
Write a program to compare various CPU Scheduling Algorithms over different Scheduling Criteria.
Write a program to implement classical inter process communication problem (producer consumer).
Write a program to implement classical inter process communication problem (Reader Writers).
Write a program to implement classical inter process communication problem (Dining Philosophers).
Write a program to implement & Compare various page replacementalgorithms.
Writeaprogramtoimplement&ComparevariousDisk&Drumschedulingalgorithms
Write a program to implement Banker’salgorithms.
Write a program to implement Remote ProccedureCall (RPC).
Write a Devices Drivers for any Device orperipheral.
Morris Mano , “Computer System Organization”PHI
Alan Clements: “Computer Organization and Architecture”, Cengage Learning
SubrataGhosal: “Computer Architecture and Organization”,Pearson
William stalling ,“Computer Architecture and Organization” PHI
M. Usha, T.S. Shrikant: “Computer System Architecture and Organization”, Willey India
Chaudhuri, P.Pal: “Computer Organization and Design”,PHI
Sarangi: “Computer Organization and Architecture”,Mc-GrawHills
Study of Multiplexer andDemultiplexer
Study of Half Adder and Subtractor
Study of Full Adder andSubtractor
WAP to add two 8 bit numbers and store the result at memory location2000
WAP to multiply two 8 bit numbers stored at memory location 2000 and 2001 and stores the result at memory location 2000 and2001.
WAP to add two 16-bit numbers. Store the result at memory address starting from 2000.
WAP which tests if any bit is '0' in a data byte specified at an address 2000. If it is so, 00 would be stored at address 2001 and if not so then FF should be storedata the same address.
Assume that 3 bytes of data are stored at consecutive memory addresses of the data memory starting at 2000. Write a program which loads register C with (2000), i.e. with data contained at memory address2000, D with (2001), E with (2002) and A with (2001).
Sixteen bytes of data are specified at consecutive data-memory locations starting at 2000. Write a program which increments the value of all sixteen bytes by01.
WAP to add t 10 bytes stored at memory location starting from 3000. Store the result at memory location300A
Explain different terminologies of computer network and compare the architecture of networks.
Evaluate the MAC layer performance.
Construct and evaluate the existing protocols at the network and transport layer.
Design and debug the IP networks.
HUB, Switches- Learning, Cut-Through and store and forward switches, Bridges: IEEE 802.x to IEEE 802.y, Spanning Tree, Remote Bridge. Internetworking Devices: Routers & gateways. The network layer: Design issues and functions, Internal organization (Virtual Circuit & Datagrams).
1.Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
2 Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I”
6th Edition,Pearson Education
DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition.
KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.
Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.
Study of Different Type of LAN& Network Equipment’s.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
LAN installations and Configurations.
Write a program to implement various types of error correcting techniques.
Write a program to Implement various types of framing methods.
Study of Tool Command Language (TCL).
Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet,QualNetetc .
Study & Installation of ONE (Opportunistic Network Environment) Simulator for High Mobility Networks .
Configure 802.11 WLAN.
Implement &Simulate various types of routing algorithm.
Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA using Standard Network Simulators.
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet. protocols.
Understand fundamentals of programming such as variables, conditional and iterativeexecution, methods, etc.
Understand fundamentals of object-oriented programming in Java and be familiar of theimportant concepts like class, inheritance and multithreading, AWT and JDBC.
Students will able to use the Java SDK environment to create, debug and run simple Javaprograms.
E. Balagurusamy, “Programming with java A Primer”, McGrawHill.
Sharanam Shah, “ Core Java 8 for Beginners”, Shroff Publisher.
Naughton&Schildt, “The Complete Reference Java 2”, Tata McGraw Hill.
Horstmann& Cornell, “Core Java 2” (Vol I &II ), Pearson.
Write a program that accepts two numbers from the user and print their sum.
Write a program to calculate addition of two number using prototyping of methods.
Program to demonstrate function overloading for calculation of average.
Program to demonstrating overloaded constructor for calculating box volume.
Program to show the detail of students using concept of inheritance.
Program to demonstrate package concept.
Program to demonstrate implementation of an interface which contains two methodsdeclaration square and cube.
Program to demonstrate exception handling in case of division by zero error.
Program to demonstrate multithreading.
Program to demonstrate JDBC concept using create a GUI based application for student information.
Program to display “Hello World” in web browser using applet.
Program to add user controls to applets.
Write a program to create an application using concept of swing.
Program to demonstrate student registration functionality using servlets with session management.
The objective of this course is to make students to learn how cyber security for the IoT works along with key technical details, process flows, definitions of terms and practical examples.
Fundamentals of encryption for cyber security: Cryptography – Need and the Mathematical basics- History of cryptography, symmetric ciphers, block ciphers, DES – AES. Public-key cryptography: RSA, Diffie-Hellman Algorithm, Elliptic Curve Cryptosystems, Algebraic structure, Triple Data Encryption Algorithm (TDEA) Block cipher.
IoT security framework : IOT security frame work, Security in hardware, Bootprocess, OS & Kernel, application, run time environment and containers. Need and methods of Edge Security, Network Security: Internet, Intranet, LAN, Wireless Networks, Wireless cellular networks, Cellular Networks and VOIP.
Elementary blocks of IoT Security & Models for Identity Management: Vulnerability of IoT and elementary blocks of IoT Security, Threat modeling – Key elements. Identity management Models and Identity management in IoT, Approaches using User-centric, Device-centric and Hybrid.
Identity Management and Trust Establishment: Trust management lifecycle, Identity and Trust, Web of trust models. Establishment: Cryptosystems – Mutual establishment phases – Comparison on security analysis. Identity management framework, Access Control in IoT and light weight cryptography: Capability-based access control schemes, Concepts, identity-based and identity-driven, Light weight cryptography, need and methods, IoT use cases
Security and Digital Identity in Cloud Computing: Security, Digital identity management in cloud, Classical solutions, alternative solutions, Management of privacy and personal data in Cloud; Cyber Crimes, Hackers and Forensics: Cyber Crimes and Laws – Hackers – Dealing with the rise tide of Cyber Crimes – Cyber Forensics and incident Response – Network Forensics.
John R. Vacca, “Computer and Information Security Handbook”, Elsevier, 2013.
Parikshit Narendra Mahalle , Poonam N. Railkar, “Identity Management for Internet of Things”, River Publishers, 2015.
William Stallings, “Cryptography and Network security: Principles and Practice”, 5th Edition, 2014, Pearson Education, India.
Maryline Laurent, SamiaBouzefrane, “Digital Identity Management”, Elsevier, 2015.
Joseph MiggaKizza, “Computer Network Security”, Springer, 2005.
Christof Paar and Jan Pelzl, “Understanding Cryptography – A Textbook for Students and Practitioners”, Springer, 2014.
Behrouz A.Forouzan : Cryptography & Network Security – The McGraw Hill Company, 2007.
Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: “Private Communication in a public World”, PTR Prentice Hall, Second Edition, 2002.
Alasdair Gilchrist, “IoT security Issues”, Oreilly publications, 2017.
On successful completion of this course the students will be able to-
Design and implement cryptography algorithms
Solve network security problems in various networks
Build security systems using elementary blocks
Build Trustable cloud based IoT systems
Solve IoT security problems using light weight cryptography and appreciate the need for cyber security laws and methods.
Describe the importance and objectives of an operating system and various services provided by the operating system.
Interpret the important functions of different modules of an Operating system, like process management, memory management, device management and file system, etc. and will be able to apply these concepts in given test cases.
Compare and contrast different policies of CPU scheduling, Inter-process Communication, Page replacement and disk scheduling algorithms etc.
Design and develop small modules, shell and utility programs using system calls of Linux or some educational operating system.
Silberschatz, Galvin, Gagne, “Operating System Concepts’’, Wiley,9 Edition.
William Stalling, “Operating Systems”, PearsonEducation,
Andrew S. Tanenbaum, “Modern Operating Systems”, 3/e, PrenticeHall
Maurice J. Bach, “ The Design of Unix Operating System”, Prentice Hall of India,
Bovet &Cesati, “Understanding the Linux Kernel”, O’Reily,2/E.
Write a program to implement FCFS CPU schedulingalgorithm.
Write a program to implement SJF CPU schedulingalgorithm.
Write a program to implement Priority CPU Schedulingalgorithm.
Write a program to implement Round Robin CPU schedulingalgorithm.
Write a program to compare various CPU Scheduling Algorithms over different Scheduling Criteria.
Write a program to implement classical inter process communication problem (producer consumer).
Write a program to implement classical inter process communication problem (Reader Writers).
Write a program to implement classical inter process communication problem (Dining Philosophers).
Write a program to implement & Compare various page replacementalgorithms.
Writeaprogramtoimplement&ComparevariousDisk&Drumschedulingalgorithms
Write a program to implement Banker’salgorithms.
Write a program to implement Remote ProccedureCall (RPC).
Write a Devices Drivers for any Device orperipheral.
Morris Mano , “Computer System Organization”PHI
Alan Clements: “Computer Organization and Architecture”, Cengage Learning
SubrataGhosal: “Computer Architecture and Organization”,Pearson
William stalling ,“Computer Architecture and Organization” PHI
M. Usha, T.S. Shrikant: “Computer System Architecture and Organization”, Willey India
Chaudhuri, P.Pal: “Computer Organization and Design”,PHI
Sarangi: “Computer Organization and Architecture”,Mc-GrawHills
Study of Multiplexer andDemultiplexer
Study of Half Adder and Subtractor
Study of Full Adder andSubtractor
WAP to add two 8 bit numbers and store the result at memory location2000
WAP to multiply two 8 bit numbers stored at memory location 2000 and 2001 and stores the result at memory location 2000 and2001.
WAP to add two 16-bit numbers. Store the result at memory address starting from 2000.
WAP which tests if any bit is '0' in a data byte specified at an address 2000. If it is so, 00 would be stored at address 2001 and if not so then FF should be storedata the same address.
Assume that 3 bytes of data are stored at consecutive memory addresses of the data memory starting at 2000. Write a program which loads register C with (2000), i.e. with data contained at memory address2000, D with (2001), E with (2002) and A with (2001).
Sixteen bytes of data are specified at consecutive data-memory locations starting at 2000. Write a program which increments the value of all sixteen bytes by01.
WAP to add t 10 bytes stored at memory location starting from 3000. Store the result at memory location300A
Explain different terminologies of computer network and compare the architecture of networks.
Evaluate the MAC layer performance.
Construct and evaluate the existing protocols at the network and transport layer.
Design and debug the IP networks.
HUB, Switches- Learning, Cut-Through and store and forward switches, Bridges: IEEE 802.x to IEEE 802.y, Spanning Tree, Remote Bridge. Internetworking Devices: Routers & gateways. The network layer: Design issues and functions, Internal organization (Virtual Circuit & Datagrams).
1.Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
2 Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I”
6th Edition,Pearson Education
DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition.
KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.
Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.
Study of Different Type of LAN& Network Equipment’s.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
LAN installations and Configurations.
Write a program to implement various types of error correcting techniques.
Write a program to Implement various types of framing methods.
Study of Tool Command Language (TCL).
Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet,QualNetetc .
Study & Installation of ONE (Opportunistic Network Environment) Simulator for High Mobility Networks .
Configure 802.11 WLAN.
Implement &Simulate various types of routing algorithm.
Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA using Standard Network Simulators.
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet. protocols.
Understand fundamentals of programming such as variables, conditional and iterativeexecution, methods, etc.
Understand fundamentals of object-oriented programming in Java and be familiar of theimportant concepts like class, inheritance and multithreading, AWT and JDBC.
Students will able to use the Java SDK environment to create, debug and run simple Javaprograms.
E. Balagurusamy, “Programming with java A Primer”, McGrawHill.
Sharanam Shah, “ Core Java 8 for Beginners”, Shroff Publisher.
Naughton&Schildt, “The Complete Reference Java 2”, Tata McGraw Hill.
Horstmann& Cornell, “Core Java 2” (Vol I &II ), Pearson.
Write a program that accepts two numbers from the user and print their sum.
Write a program to calculate addition of two number using prototyping of methods.
Program to demonstrate function overloading for calculation of average.
Program to demonstrating overloaded constructor for calculating box volume.
Program to show the detail of students using concept of inheritance.
Program to demonstrate package concept.
Program to demonstrate implementation of an interface which contains two methodsdeclaration square and cube.
Program to demonstrate exception handling in case of division by zero error.
Program to demonstrate multithreading.
Program to demonstrate JDBC concept using create a GUI based application for student information.
Program to display “Hello World” in web browser using applet.
Program to add user controls to applets.
Write a program to create an application using concept of swing.
Program to demonstrate student registration functionality using servlets with session management.