HEAD
The objective of this course is to make students learn about the architecture, Components and various protocols of IoT.
IoT definition, Characteristics, IoT conceptual and architectural framework, Physical and logical design of IoT, IoT enablers, Modern day IoT applications, M2M communications, IoT vs M2M, IoT vs WoT, IoT reference architecture, IoT Network configurations, IoT LAN, IoT WAN, IoT Node, IoT Gateway, IoT Proxy
Basics of IoT Networking, IoT Components, Functional components of IoT, IoT service oriented architecture, IoT challenges, 6LowPAN, IEEE 802.15.4, RFID Features, RFID working principle and applications, NFC (Near Field communication), Bluetooth, Wireless Sensor Networks and its Applications
IoT Data Link Layer & Network Layer Protocols: PHY/MAC Layer(3GPP MTC, IEEE 802.11, IEEE 802.15), Wireless HART,ZWave,Bluetooth Low Energy, Zigbee Smart Energy, DASH7 - Network Layer-IPv4,IPv6, 6LoWPAN, 6TiSCH,ND, DHCP, ICMP, RPL, CORPL, CARP
IoT Transport & Session Layer Protocols: Transport Layer (TCP, MPTCP, UDP, DCCP, SCTP)-(TLS, DTLS) – Session Layer-HTTP, CoAP, CoAP message types, CoAP Request-Response model, XMPP, AMQP, MQTT, MQTT methods and components, MQTT communication, topics and applications, SMQTT
IoT Service Layer Protocols & Security Protocols: Service Layer -oneM2M, ETSI M2M, OMA, BBF – Security in IoT Protocols – MAC802.15.4 , 6LoWPAN, RPL, Application Layer
IoT Platforms, Arduino, Raspberry Pi Board, Other IoT Platforms; Data Analytics for IoT, Cloud for IoT, Cloud storage models & communication APIs, IoT case studies
Vijay Madisetti, ArshdeepBahga, “Ïnternet of Things, A Hands on Approach”, University Press
Dr. SRN Reddy, RachitThukral and Manasi Mishra, “Introduction to Internet of Things: A practical Approach”, ETI Labs
Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use Cases”, CRC Press
Jeeva Jose, “Internet of Things”, Khanna Publishing House, Delhi
Adrian McEwen, “Designing the Internet of Things”, Wiley
Raj Kamal, “Internet of Things: Architecture and Design”, McGraw Hill
CunoPfister, “Getting Started with the Internet of Things”, O Reilly Media
Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The EvolvingWorld of M2M Communications”, ISBN: 978-1-118-47347-4, Willy Publications ,2016
Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand,StamatisKarnouskos, David Boyle, “From Machine-to-Machine to the Internet ofThings: Introduction to a New Age of Intelligence”, 1st Edition, Academic Press, 2015
Bernd Scholz-Reiter, Florian Michahelles, “Architecting the Internet of Things”,ISBN 978-3-642- 19156-5 e-ISBN 978-3-642-19157-2, Springer, 2016
On successful completion of this course the students will be able to-
Understand the concepts of IoT Architecture
Apply knowledge of IoT Networking and its components to design IoT-based systems
Understand data link layer and network layer protocols of IoT
Use the knowledge of IoT transport and session layer protocols in various applications of IoT
Design IoT-based systems for real-world problems
The objective of this course is to make students to learn how cyber security for the IoT works along with key technical details, process flows, definitions of terms and practical examples.
Fundamentals of encryption for cyber security: Cryptography – Need and the Mathematical basics- History of cryptography, symmetric ciphers, block ciphers, DES – AES. Public-key cryptography: RSA, Diffie-Hellman Algorithm, Elliptic Curve Cryptosystems, Algebraic structure, Triple Data Encryption Algorithm (TDEA) Block cipher
IoT security framework : IOT security frame work, Security in hardware, Bootprocess, OS & Kernel, application, run time environment and containers. Need and methods of Edge Security, Network Security: Internet, Intranet, LAN, Wireless Networks, Wireless cellular networks, Cellular Networks and VOIP.
Elementary blocks of IoT Security & Models for Identity Management: Vulnerability of IoT and elementary blocks of IoT Security, Threat modeling – Key elements. Identity management Models and Identity management in IoT, Approaches using User-centric, Device-centric and Hybrid.
Identity Management and Trust Establishment: Trust management lifecycle, Identity and Trust, Web of trust models. Establishment: Cryptosystems – Mutual establishment phases – Comparison on security analysis. Identity management framework
Access Control in IoT and light weight cryptography: Capability-based access control schemes, Concepts, identity-based and identity-driven, Light weight cryptography, need and methods, IoT use cases
Security and Digital Identity in Cloud Computing: Security, Digital identity management in cloud, Classical solutions, alternative solutions, Management of privacy and personal data in Cloud; Cyber Crimes, Hackers and Forensics: Cyber Crimes and Laws – Hackers – Dealing with the rise tide of Cyber Crimes – Cyber Forensics and incident Response – Network Forensics
John R. Vacca, “Computer and Information Security Handbook”, Elsevier, 2013.
Parikshit Narendra Mahalle , Poonam N. Railkar, “Identity Management for Internet of Things”, River Publishers, 2015.
William Stallings, “Cryptography and Network security: Principles and Practice”, 5th Edition, 2014, Pearson Education, India.
Maryline Laurent, Samia Bouzefrane, “Digital Identity Management”, Elsevier, 2015.
Joseph Migga Kizza, “Computer Network Security”, Springer, 2005.
Christof Paar and Jan Pelzl, “Understanding Cryptography – A Textbook for Students and Practitioners”, Springer, 2014.
Behrouz A.Forouzan : Cryptography & Network Security – The McGraw Hill Company, 2007.
Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: “Private Communication in a public World”, PTR Prentice Hall, Second Edition, 2002.
Alasdair Gilchrist, “IoT security Issues”, Oreilly publications, 2017.
On successful completion of this course the students will be able to-
Design and implement cryptography algorithms
Solve network security problems in various networks
Build security systems using elementary blocks
Build Trustable cloud based IoT systems
Solve IoT security problems using light weight cryptography and appreciate the need for cyber security laws and methods.
The objective of this course is to make students to understand the basic WSN technology and supporting protocols.
Overview of Wireless Sensor Networks: Network Characteristics, Network Applications, Network Design Objectives, Network Design Challenges, Technological Background : MEMS Technology , Wireless Communication Technology , Hardware and Software Platforms, Wireless Sensor Network Standards, Introduction, Network Architectures for Wireless Sensor Networks, Classifications of Wireless Sensor Networks, Protocol Stack for Wireless Sensor Networks.
Fundamental MAC Protocols, MAC Design for Wireless Sensor Networks, MAC Protocols for Wireless Sensor Networks: Contention-Based Protocols, Contention-Free Protocols, Hybrid Protocols. Introduction, Fundamentals and Challenges, Taxonomy of Routing and Data Dissemination Protocols, Overview of Routing and Data Dissemination Protocols: Location-Aided Protocols, Layered and In-Network Processing- Based Protocols, Data-Centric Protocols, Multipath-Based Protocols, Mobility-Based Protocols, QoS Based Protocols, Heterogeneity-Based Protocols.
Wireless Sensor Network Architectures and Overview of Node Clustering Structures, Query Processing in Wireless Sensor Networks, Data Aggregation in Wireless Sensor Networks, Node Localization: Concepts and Challenges of Node Localization Technologies, Ranging Techniques for Wireless Sensor Networks, Wireless Localization Algorithms, Wireless Sensor Node Localization.
Need for Energy Efficiency and Power Control in Wireless Sensor Networks, Passive Power Conservation Mechanisms: Physical-Layer Power Conservation Mechanisms, MAC Layer Power Conservation Mechanisms, Higher Layer Power Conservation Mechanisms, and Active Power Conservation Mechanisms: MAC Layer Mechanisms, Network Layer Mechanisms, Transport Layer Mechanisms.
Fundamentals of Network Security, Challenges of Security in Wireless Sensor Networks, Security Attacks in Sensor Networks, Protocols and Mechanisms for Security, IEEE 802.15.4 and ZigBee Security .
Wireless Sensor Networks A Networking Perspective, Jun Zheng & Abbas Jamalipour, a john Wiley & sons, Inc., publication .
Wireless sensor networks Technology, Protocols, and Applications , kazem sohraby, daniel minoli, taieb znati , John Wiley & sons, Inc., publication .
Fundamentals of wireless sensor networks theory and practice, Waltenegus Dargie, Christian Poellabauer, John Wiley and Sons, Ltd., Publication.
On successful completion of this course the students will be able to-
Explain the basic concepts of wireless sensor networks, sensing, computing and communication tasks
Demonstrate knowledge of MAC protocols and routing protocols developed for WSN
Describe and explain radio standards and communication protocols adopted in wireless sensor networks
Be able to carry out simple analysis and planning of WSNs
To develop wireless sensor systems for different applications
The objective of this course is to make students to understand basic concepts of mobile application development.
Overview of Mobile App Development: Mobile Applications, A formula for designing engaging applications, Unique challenges for development of engaging applications, Enterprise mobile development, Mobile App Development Lifecycle Overview
Importance of Design, App Design issues and considerations, Scope of Design in Mobile App Development, Design Principles and Guidelines, Some Design Methods, Factors for choosing mobile app, Mobile App Architectural Components, Mobile App Flow, Mobile App Deployment Considerations
Building Mobile Apps Powered by Enterprise Backend, Connecting the Mobile App with Enterprise IT Services and Data, Types of IT Backend to Integrate from Mobile Apps, Type of API Protocols, Security Integration, Mobile Devices Security Considerations, Secured Data Store and Synchronization, Enterprise Mobile Application Management and Device Management, Special Challenges in Managing Mobile Applications and Devices
Quality, Cost of Quality, Automated versus Manual Testing, Preproduction versus Post release, Automated Mobile App Testing Considerations, Monetizing Apps, Publishing Apps
The Android Operating System, Working of Android Apps, Programming languages used for developing Android Apps, Android Studio, Emulators, General Procedure for developing an App
Leigh Williamson, Roland Barcia, Omkar Chandgadkar, Ashish Mathur, Soma Ray, Darrell Schrag, Roger Snook, Jianjun Zhang, “ Enterprise Class Mobile Application Development”, IBM Press Pearson plc, 2016
Jakob Iversen Michael Eierman, “Learning Mobile App Development”, Pearson Education, 2014
J. Paul Cardle, “Android App Development in Android Studio”, Manchester Academic Publishers
On successful completion of this course the students will be able to-
Understand the entire lifecycle involved in mobile app development
Design a mobile app
Understand Security considerations in mobile app development
Know about the range of techniques available for testing of Mobile Apps and understand when one approach is better than the others.
Follow general procedure for developing an App
The objective of this course is to provide conceptual understanding of how block chain technology can be used to innovate and improve business processes.
Working with Consensus in Bitcoin: Distributed consensus in open environments, Consensus in a Bitcoin network, Proof of Work (PoW) – basic introduction, HashCash PoW, Bitcoin PoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool
Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain Technology and Leveraging Block Chain Programming”
Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing
Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Block Chain”, Packt Publishing
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
After the completion of this course, the students will be able to:
Understand block chain technology
Acquire knowledge of cryptocurrencies
Develop block chain based solutions and write smart contract using Hyperledger Fabric and Ethereum frameworks
Build and deploy block chain application for on premise and cloud based architecture
Integrate ideas from various domains and implement them using block chain technology in different perspectives
The objective of this course is to discuss cloud and fog computing as an increasingly viable means of achieving enhanced monitoring and control of industrial processes, differentiate between Cloud and edge-fog computing and what role the two technologies will increasingly play in process control and automation.
Cloud Computing Fundamentals: Motivation for Cloud Computing, Defining Cloud Computing, Principles of Cloud Computing , Five Essential Characteristics, Cloud Ecosystem, Requirements for Cloud Services, Cloud Applications, Benefits and Drawbacks, Cloud Architecture, Network Connectivity in Cloud Computing, Managing the Cloud, Migrating Application to Cloud
Cloud Deployment Models: Private Cloud, Public Cloud, Community Cloud, Hybrid Cloud; Cloud Service Models: Infrastructure as a Service, Platform as a Service, Software as a Service, Their characteristics, Suitability, Pros and Cons, Cloud Service Providers
Technological Drivers of Cloud Computing: Virtualization, Approaches in Virtualization, Hypervisor and Its Role, Types of Virtualization; Memory and Storage Technologies, Networking Technologies, Web 2.0 and Web 3.0, Agile SDLC for Cloud Computing, Programming Models for Cloud Computing
Security in Cloud Computing: Security Aspects, Data Security, Virtualization Security, Network Security, Security Issues in Cloud Service Models, Audit and Compliance, Data Protection in the Cloud, Cloud Security as a Service; Advanced Concepts in Cloud Computing: Intercloud, Cloud Management, Mobile Cloud, Cloud Governance, Green Cloud, Cloud Analytics
Introduction to Fog Computing, Difference between cloud computing and fog computing, Fog Computing benefits and drawbacks, Applications of Fog computing, Role of Fog computing in Internet of Things, Need for Fog computation, Fog data processing layers.
K. Chandrasekaran, “Essentials of Cloud Computing”, CRC Press, 2015
Arshdeep Bahga, Vijay Madisetti, “Cloud Computing: A Hands-on Approach”, 2013.
Rajkumar Buyya, James Broberg, Andrzej Goscinski, “Cloud Computing: Principles and Paradigms”, Wiley
Rajkumar Buyya, Satish Narayana Srirama, “ Fog and Edge Computing: Principles and Paradigms”, Wiley
Assad Abbas, Samee U. Khan, Albert Y. Zomaya “Fog Computing: Theory and Practice”, Wiley, 2020
On successful completion of this course the students will be able to-
Articulate the main concepts, key technologies, strengths, and limitations of cloud computing
Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc.
Have understanding of the Technological Drivers of Cloud Computing
Explain the core issues of cloud computing such as security, privacy, and interoperability and provide the appropriate cloud computing solutions and recommendations according to the applications used.
Attempt to generate new ideas and innovations in cloud computing and Fog computing.
The objective of this course is to equip students with Python programming skills to develop useful IoT (Internet of Things) applications.
Python Concepts, Data Structures, Classes, Interpreter – Program Execution – Statements – Expressions – Flow Controls – Functions - Numeric Types – Sequences - Strings, Tuples, Lists and - Class Definition – Constructors – Inheritance – Overloading – Text & Binary Files - Reading and Writing
Data Wrangling, Combining and Merging Data Sets – Reshaping and Pivoting – Data Transformation – String Manipulation, Regular Expressions
Data Aggregation, Group Operations, Time series & Web Scrapping, Group By Mechanics – Data Aggregation – GroupWise Operations and Transformations – Pivot Tables and Cross Tabulations – Date and Time Date Type tools – Time Series Basics – Data Ranges, Frequencies and Shifting. Data Acquisition by Scraping web applications –Submitting a form - Fetching web pages – Downloading web pages through form submission – CSS Selectors
Visualization in Python, Matplot lib package – Plotting Graphs – Controlling Graph – Adding Text – More Graph Types – Getting and setting values – Patches
Implementation using Raspberry Pi, Working with Raspberry Pi 3 Model - Installing OS and Designing Systems using Raspberry pi - Configuring Raspberry Pi for VNC Connection - Getting introduced to Linux OS Basic Linux commands and uses - Getting Started with Python - Interface sensor and Actuator with Raspberry Pi
Mark Lutz, “Learning Python”, O'Reilly Media, 5th Edition, 2016.
White, “Hadoop: The Definitive Guide”, Third Edition - O’Reilly, 2012.
Brandon Rhodes and John Goerzen, “Foundations of Python Network Programming: The Comprehensive Guide to Building Network Applications with Python”, Apress, Second Edition, 2016
On successful completion of this course the students will be able to-
Interpret the fundamental Python syntax and semantics and be fluent in the use of Python control flow statements.
Determine the methods to create and manipulate Python programs by utilizing the data structures like lists, dictionaries, tuples and sets.
Develop Python programs
Plot data using appropriate Python visualization libraries
Develop intelligent IoT devices using Python
The objective of this course is to introduce big data technology platforms and how these can be applied to IoT data.
Introducing IoT Analytics: Types of Data Sources, Understanding Big Data, Applications of Big Data Analytics, IoT Data and Big Data, Defining IoT Analytics, Challenges of IoT Analytics, IoT Analytics Lifecycle and Techniques
IoT, Cloud and Big Data Integration for IoT Analytics: Cloud-based IoT Platform, Requirements of IoT Big Data Analytics Platform, Functional Architecture, Data Analytics for the IoT, Characteristics of IoT Generated Data, Data Analytic Techniques and Technologies, Data Collection Using Low-power, Long-range Radios, IoT Analytics for the cloud
Searching the Internet of Things: A Search Architecture for Social and Physical Sensors, Local Event Retrieval, Using Sensor Metadata Streams to Identify Topics of Local Events in the City, Venue Recommendation, Development Tools for IoT Analytics Applications; IoT Analytics as a Service: Architecture for IoT Analytics- as-a-Service, Sensing-as-a-Service, Scheduling, Metering and Service Delivery, Sensing-as-a-Service Example, From Sensing-as-a-Service to IoT-Analytics- as-a-Service
Data Science for IoT Analytics: Machine Learning, Feature Engineering with IoT Data, Validation Methods, Bias, Variance, Comparing different Models to find the Best fit, Anomaly Detection, Forecasting, Deep Learning with IoT data; Strategies to organize data for Analytics; The Economics of IoT Analytics: Cost Considerations for IoT Analytics
IoT Analytics Applications and Case Studies: Data Analytics in Smart Buildings, Internet-of-Things Analytics for Smart Cities, Ethical IoT
John Soldatos, “Building Blocks for IoT Analytics”, River Publishers, 2017
Andrew Minteer, “Analytics for the Internet of Things”, Packt Publishing, 2017
On successful completion of this course the students will be able to-
Understand IoT Analytics Lifecycle and Techniques
Know the characteristics of IoT Generated Data
Use development tools for IoT Analytics Applications
Learn Machine Learning for IoT data
Understand IoT Data Analytics applications
The objective of this course is to develop understanding of the two most important network technologies that will transform networks operated by Carrier Service Providers: Software Defined Networking (SDN) and Network Functions Virtualization (NFV).
Software Defined Networks: Background and Motivation, Evolving Network Requirements, The SDN Approach, SDN Architecture, SDN- and NFV-Related Standards
SDN Data Plane and OpenFlow: SDN Data Plane Functions and Protocols, OpenFlow Logical Network Device, OpenFlow Protocol; SDN Control Plane: SDN Control Plane Architecture, ITU-T Model, OpenDaylight, REST, Cooperation and Coordination Among Controllers; SDN Application Plane: SDN Application Plane Architecture, Network Services Abstraction Layer, Traffic Engineering, Measurement and Monitoring, Security, Data Center Networking, Information-Centric Networking
Network Functions Virtualization: Concepts and Architecture, Background and Motivation for NFV, Virtual Machines, NFV Concepts, NFV Benefits and Requirements, NFV Reference Architecture; NFV Functionality: NFV Infrastructure, Virtualized Network Functions, NFV Management and Orchestration, NFV Use Cases, SDN and NFV; Network Virtualization: Virtual LANs, OpenFlow VLAN Support, Virtual Private Networks, Network Virtualization, Software-Defined Infrastructure
Defining And Supporting User Needs: Quality of Service, QoS Architectural Framework, Integrated Services Architecture, Differentiated Services, Service Level Agreements, IP Performance Metrics, OpenFlow QoS Support; QoE: User Quality of Experience: QoE, Service Failures Due to Inadequate QoE Considerations, Definition of Quality of Experience, Factors Influencing QoE, Measurements of QoE, Applications of QoE
Security: Security Requirements, SDN Security, NFV Security, Cloud Security, IoT Security
William Stallings, “Foundations of Modern Networking”, Pearson Education, 2016
Paul Goransson, “Software Defined Networks A Comprehensive Approach”, Morgan Kaufmann, Elsevier
Thomas D. Nadeau, Ken Gray, “Software Defined Networks”, O’Reilly
Guy Pujolle, “Software Networks”, Wiley
On successful completion of this course the students will be able to-
Have knowledge of SDN concepts and technology
Know about the application areas that can be supported by SDN and provides a number of examples of SDN applications
Discuss NFV concepts, technology, and applications, as well as network virtualization
Understand quality of service (QoS) and quality of experience (QoE) to determine customer needs and network design responses to those needs
Analyse the security issues that have emerged with the evolution of SDN and NFV
The objective of this course is to make students learn about the architecture, Components and various protocols of IoT.
IoT definition, Characteristics, IoT conceptual and architectural framework, Physical and logical design of IoT, IoT enablers, Modern day IoT applications, M2M communications, IoT vs M2M, IoT vs WoT, IoT reference architecture, IoT Network configurations, IoT LAN, IoT WAN, IoT Node, IoT Gateway, IoT Proxy
Basics of IoT Networking, IoT Components, Functional components of IoT, IoT service oriented architecture, IoT challenges, 6LowPAN, IEEE 802.15.4, RFID Features, RFID working principle and applications, NFC (Near Field communication), Bluetooth, Wireless Sensor Networks and its Applications
IoT Data Link Layer & Network Layer Protocols: PHY/MAC Layer(3GPP MTC, IEEE 802.11, IEEE 802.15), Wireless HART,ZWave,Bluetooth Low Energy, Zigbee Smart Energy, DASH7 - Network Layer-IPv4,IPv6, 6LoWPAN, 6TiSCH,ND, DHCP, ICMP, RPL, CORPL, CARP
IoT Transport & Session Layer Protocols: Transport Layer (TCP, MPTCP, UDP, DCCP, SCTP)-(TLS, DTLS) – Session Layer-HTTP, CoAP, CoAP message types, CoAP Request-Response model, XMPP, AMQP, MQTT, MQTT methods and components, MQTT communication, topics and applications, SMQTT
IoT Service Layer Protocols & Security Protocols: Service Layer -oneM2M, ETSI M2M, OMA, BBF – Security in IoT Protocols – MAC802.15.4 , 6LoWPAN, RPL, Application Layer
IoT Platforms, Arduino, Raspberry Pi Board, Other IoT Platforms; Data Analytics for IoT, Cloud for IoT, Cloud storage models & communication APIs, IoT case studies
Vijay Madisetti, ArshdeepBahga, “Ïnternet of Things, A Hands on Approach”, University Press
Dr. SRN Reddy, RachitThukral and Manasi Mishra, “Introduction to Internet of Things: A practical Approach”, ETI Labs
Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use Cases”, CRC Press
Jeeva Jose, “Internet of Things”, Khanna Publishing House, Delhi
Adrian McEwen, “Designing the Internet of Things”, Wiley
Raj Kamal, “Internet of Things: Architecture and Design”, McGraw Hill
CunoPfister, “Getting Started with the Internet of Things”, O Reilly Media
Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The EvolvingWorld of M2M Communications”, ISBN: 978-1-118-47347-4, Willy Publications ,2016
Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand,StamatisKarnouskos, David Boyle, “From Machine-to-Machine to the Internet ofThings: Introduction to a New Age of Intelligence”, 1st Edition, Academic Press, 2015
Bernd Scholz-Reiter, Florian Michahelles, “Architecting the Internet of Things”,ISBN 978-3-642- 19156-5 e-ISBN 978-3-642-19157-2, Springer, 2016
On successful completion of this course the students will be able to-
Understand the concepts of IoT Architecture
Apply knowledge of IoT Networking and its components to design IoT-based systems
Understand data link layer and network layer protocols of IoT
Use the knowledge of IoT transport and session layer protocols in various applications of IoT
Design IoT-based systems for real-world problems
The objective of this course is to make students to learn how cyber security for the IoT works along with key technical details, process flows, definitions of terms and practical examples.
Fundamentals of encryption for cyber security: Cryptography – Need and the Mathematical basics- History of cryptography, symmetric ciphers, block ciphers, DES – AES. Public-key cryptography: RSA, Diffie-Hellman Algorithm, Elliptic Curve Cryptosystems, Algebraic structure, Triple Data Encryption Algorithm (TDEA) Block cipher
IoT security framework : IOT security frame work, Security in hardware, Bootprocess, OS & Kernel, application, run time environment and containers. Need and methods of Edge Security, Network Security: Internet, Intranet, LAN, Wireless Networks, Wireless cellular networks, Cellular Networks and VOIP.
Elementary blocks of IoT Security & Models for Identity Management: Vulnerability of IoT and elementary blocks of IoT Security, Threat modeling – Key elements. Identity management Models and Identity management in IoT, Approaches using User-centric, Device-centric and Hybrid.
Identity Management and Trust Establishment: Trust management lifecycle, Identity and Trust, Web of trust models. Establishment: Cryptosystems – Mutual establishment phases – Comparison on security analysis. Identity management framework
Access Control in IoT and light weight cryptography: Capability-based access control schemes, Concepts, identity-based and identity-driven, Light weight cryptography, need and methods, IoT use cases
Security and Digital Identity in Cloud Computing: Security, Digital identity management in cloud, Classical solutions, alternative solutions, Management of privacy and personal data in Cloud; Cyber Crimes, Hackers and Forensics: Cyber Crimes and Laws – Hackers – Dealing with the rise tide of Cyber Crimes – Cyber Forensics and incident Response – Network Forensics
John R. Vacca, “Computer and Information Security Handbook”, Elsevier, 2013.
Parikshit Narendra Mahalle , Poonam N. Railkar, “Identity Management for Internet of Things”, River Publishers, 2015.
William Stallings, “Cryptography and Network security: Principles and Practice”, 5th Edition, 2014, Pearson Education, India.
Maryline Laurent, Samia Bouzefrane, “Digital Identity Management”, Elsevier, 2015.
Joseph Migga Kizza, “Computer Network Security”, Springer, 2005.
Christof Paar and Jan Pelzl, “Understanding Cryptography – A Textbook for Students and Practitioners”, Springer, 2014.
Behrouz A.Forouzan : Cryptography & Network Security – The McGraw Hill Company, 2007.
Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: “Private Communication in a public World”, PTR Prentice Hall, Second Edition, 2002.
Alasdair Gilchrist, “IoT security Issues”, Oreilly publications, 2017.
On successful completion of this course the students will be able to-
Design and implement cryptography algorithms
Solve network security problems in various networks
Build security systems using elementary blocks
Build Trustable cloud based IoT systems
Solve IoT security problems using light weight cryptography and appreciate the need for cyber security laws and methods.
The objective of this course is to make students to understand the basic WSN technology and supporting protocols.
Overview of Wireless Sensor Networks: Network Characteristics, Network Applications, Network Design Objectives, Network Design Challenges, Technological Background : MEMS Technology , Wireless Communication Technology , Hardware and Software Platforms, Wireless Sensor Network Standards, Introduction, Network Architectures for Wireless Sensor Networks, Classifications of Wireless Sensor Networks, Protocol Stack for Wireless Sensor Networks.
Fundamental MAC Protocols, MAC Design for Wireless Sensor Networks, MAC Protocols for Wireless Sensor Networks: Contention-Based Protocols, Contention-Free Protocols, Hybrid Protocols. Introduction, Fundamentals and Challenges, Taxonomy of Routing and Data Dissemination Protocols, Overview of Routing and Data Dissemination Protocols: Location-Aided Protocols, Layered and In-Network Processing- Based Protocols, Data-Centric Protocols, Multipath-Based Protocols, Mobility-Based Protocols, QoS Based Protocols, Heterogeneity-Based Protocols.
Wireless Sensor Network Architectures and Overview of Node Clustering Structures, Query Processing in Wireless Sensor Networks, Data Aggregation in Wireless Sensor Networks, Node Localization: Concepts and Challenges of Node Localization Technologies, Ranging Techniques for Wireless Sensor Networks, Wireless Localization Algorithms, Wireless Sensor Node Localization.
Need for Energy Efficiency and Power Control in Wireless Sensor Networks, Passive Power Conservation Mechanisms: Physical-Layer Power Conservation Mechanisms, MAC Layer Power Conservation Mechanisms, Higher Layer Power Conservation Mechanisms, and Active Power Conservation Mechanisms: MAC Layer Mechanisms, Network Layer Mechanisms, Transport Layer Mechanisms.
Fundamentals of Network Security, Challenges of Security in Wireless Sensor Networks, Security Attacks in Sensor Networks, Protocols and Mechanisms for Security, IEEE 802.15.4 and ZigBee Security .
Wireless Sensor Networks A Networking Perspective, Jun Zheng & Abbas Jamalipour, a john Wiley & sons, Inc., publication .
Wireless sensor networks Technology, Protocols, and Applications , kazem sohraby, daniel minoli, taieb znati , John Wiley & sons, Inc., publication .
Fundamentals of wireless sensor networks theory and practice, Waltenegus Dargie, Christian Poellabauer, John Wiley and Sons, Ltd., Publication.
On successful completion of this course the students will be able to-
Explain the basic concepts of wireless sensor networks, sensing, computing and communication tasks
Demonstrate knowledge of MAC protocols and routing protocols developed for WSN
Describe and explain radio standards and communication protocols adopted in wireless sensor networks
Be able to carry out simple analysis and planning of WSNs
To develop wireless sensor systems for different applications
The objective of this course is to make students to understand basic concepts of mobile application development.
Overview of Mobile App Development: Mobile Applications, A formula for designing engaging applications, Unique challenges for development of engaging applications, Enterprise mobile development, Mobile App Development Lifecycle Overview
Importance of Design, App Design issues and considerations, Scope of Design in Mobile App Development, Design Principles and Guidelines, Some Design Methods, Factors for choosing mobile app, Mobile App Architectural Components, Mobile App Flow, Mobile App Deployment Considerations
Building Mobile Apps Powered by Enterprise Backend, Connecting the Mobile App with Enterprise IT Services and Data, Types of IT Backend to Integrate from Mobile Apps, Type of API Protocols, Security Integration, Mobile Devices Security Considerations, Secured Data Store and Synchronization, Enterprise Mobile Application Management and Device Management, Special Challenges in Managing Mobile Applications and Devices
Quality, Cost of Quality, Automated versus Manual Testing, Preproduction versus Post release, Automated Mobile App Testing Considerations, Monetizing Apps, Publishing Apps
The Android Operating System, Working of Android Apps, Programming languages used for developing Android Apps, Android Studio, Emulators, General Procedure for developing an App
Leigh Williamson, Roland Barcia, Omkar Chandgadkar, Ashish Mathur, Soma Ray, Darrell Schrag, Roger Snook, Jianjun Zhang, “ Enterprise Class Mobile Application Development”, IBM Press Pearson plc, 2016
Jakob Iversen Michael Eierman, “Learning Mobile App Development”, Pearson Education, 2014
J. Paul Cardle, “Android App Development in Android Studio”, Manchester Academic Publishers
On successful completion of this course the students will be able to-
Understand the entire lifecycle involved in mobile app development
Design a mobile app
Understand Security considerations in mobile app development
Know about the range of techniques available for testing of Mobile Apps and understand when one approach is better than the others.
Follow general procedure for developing an App
The objective of this course is to provide conceptual understanding of how block chain technology can be used to innovate and improve business processes.
Working with Consensus in Bitcoin: Distributed consensus in open environments, Consensus in a Bitcoin network, Proof of Work (PoW) – basic introduction, HashCash PoW, Bitcoin PoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool
Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain Technology and Leveraging Block Chain Programming”
Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing
Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Block Chain”, Packt Publishing
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
After the completion of this course, the students will be able to:
Understand block chain technology
Acquire knowledge of cryptocurrencies
Develop block chain based solutions and write smart contract using Hyperledger Fabric and Ethereum frameworks
Build and deploy block chain application for on premise and cloud based architecture
Integrate ideas from various domains and implement them using block chain technology in different perspectives
The objective of this course is to discuss cloud and fog computing as an increasingly viable means of achieving enhanced monitoring and control of industrial processes, differentiate between Cloud and edge-fog computing and what role the two technologies will increasingly play in process control and automation.
Cloud Computing Fundamentals: Motivation for Cloud Computing, Defining Cloud Computing, Principles of Cloud Computing , Five Essential Characteristics, Cloud Ecosystem, Requirements for Cloud Services, Cloud Applications, Benefits and Drawbacks, Cloud Architecture, Network Connectivity in Cloud Computing, Managing the Cloud, Migrating Application to Cloud
Cloud Deployment Models: Private Cloud, Public Cloud, Community Cloud, Hybrid Cloud; Cloud Service Models: Infrastructure as a Service, Platform as a Service, Software as a Service, Their characteristics, Suitability, Pros and Cons, Cloud Service Providers
Technological Drivers of Cloud Computing: Virtualization, Approaches in Virtualization, Hypervisor and Its Role, Types of Virtualization; Memory and Storage Technologies, Networking Technologies, Web 2.0 and Web 3.0, Agile SDLC for Cloud Computing, Programming Models for Cloud Computing
Security in Cloud Computing: Security Aspects, Data Security, Virtualization Security, Network Security, Security Issues in Cloud Service Models, Audit and Compliance, Data Protection in the Cloud, Cloud Security as a Service; Advanced Concepts in Cloud Computing: Intercloud, Cloud Management, Mobile Cloud, Cloud Governance, Green Cloud, Cloud Analytics
Introduction to Fog Computing, Difference between cloud computing and fog computing, Fog Computing benefits and drawbacks, Applications of Fog computing, Role of Fog computing in Internet of Things, Need for Fog computation, Fog data processing layers.
K. Chandrasekaran, “Essentials of Cloud Computing”, CRC Press, 2015
Arshdeep Bahga, Vijay Madisetti, “Cloud Computing: A Hands-on Approach”, 2013.
Rajkumar Buyya, James Broberg, Andrzej Goscinski, “Cloud Computing: Principles and Paradigms”, Wiley
Rajkumar Buyya, Satish Narayana Srirama, “ Fog and Edge Computing: Principles and Paradigms”, Wiley
Assad Abbas, Samee U. Khan, Albert Y. Zomaya “Fog Computing: Theory and Practice”, Wiley, 2020
On successful completion of this course the students will be able to-
Articulate the main concepts, key technologies, strengths, and limitations of cloud computing
Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc.
Have understanding of the Technological Drivers of Cloud Computing
Explain the core issues of cloud computing such as security, privacy, and interoperability and provide the appropriate cloud computing solutions and recommendations according to the applications used.
Attempt to generate new ideas and innovations in cloud computing and Fog computing.
The objective of this course is to equip students with Python programming skills to develop useful IoT (Internet of Things) applications.
Python Concepts, Data Structures, Classes, Interpreter – Program Execution – Statements – Expressions – Flow Controls – Functions - Numeric Types – Sequences - Strings, Tuples, Lists and - Class Definition – Constructors – Inheritance – Overloading – Text & Binary Files - Reading and Writing
Data Wrangling, Combining and Merging Data Sets – Reshaping and Pivoting – Data Transformation – String Manipulation, Regular Expressions
Data Aggregation, Group Operations, Time series & Web Scrapping, Group By Mechanics – Data Aggregation – GroupWise Operations and Transformations – Pivot Tables and Cross Tabulations – Date and Time Date Type tools – Time Series Basics – Data Ranges, Frequencies and Shifting. Data Acquisition by Scraping web applications –Submitting a form - Fetching web pages – Downloading web pages through form submission – CSS Selectors
Visualization in Python, Matplot lib package – Plotting Graphs – Controlling Graph – Adding Text – More Graph Types – Getting and setting values – Patches
Implementation using Raspberry Pi, Working with Raspberry Pi 3 Model - Installing OS and Designing Systems using Raspberry pi - Configuring Raspberry Pi for VNC Connection - Getting introduced to Linux OS Basic Linux commands and uses - Getting Started with Python - Interface sensor and Actuator with Raspberry Pi
Mark Lutz, “Learning Python”, O'Reilly Media, 5th Edition, 2016.
White, “Hadoop: The Definitive Guide”, Third Edition - O’Reilly, 2012.
Brandon Rhodes and John Goerzen, “Foundations of Python Network Programming: The Comprehensive Guide to Building Network Applications with Python”, Apress, Second Edition, 2016
On successful completion of this course the students will be able to-
Interpret the fundamental Python syntax and semantics and be fluent in the use of Python control flow statements.
Determine the methods to create and manipulate Python programs by utilizing the data structures like lists, dictionaries, tuples and sets.
Develop Python programs
Plot data using appropriate Python visualization libraries
Develop intelligent IoT devices using Python
The objective of this course is to introduce big data technology platforms and how these can be applied to IoT data.
Introducing IoT Analytics: Types of Data Sources, Understanding Big Data, Applications of Big Data Analytics, IoT Data and Big Data, Defining IoT Analytics, Challenges of IoT Analytics, IoT Analytics Lifecycle and Techniques
IoT, Cloud and Big Data Integration for IoT Analytics: Cloud-based IoT Platform, Requirements of IoT Big Data Analytics Platform, Functional Architecture, Data Analytics for the IoT, Characteristics of IoT Generated Data, Data Analytic Techniques and Technologies, Data Collection Using Low-power, Long-range Radios, IoT Analytics for the cloud
Searching the Internet of Things: A Search Architecture for Social and Physical Sensors, Local Event Retrieval, Using Sensor Metadata Streams to Identify Topics of Local Events in the City, Venue Recommendation, Development Tools for IoT Analytics Applications; IoT Analytics as a Service: Architecture for IoT Analytics- as-a-Service, Sensing-as-a-Service, Scheduling, Metering and Service Delivery, Sensing-as-a-Service Example, From Sensing-as-a-Service to IoT-Analytics- as-a-Service
Data Science for IoT Analytics: Machine Learning, Feature Engineering with IoT Data, Validation Methods, Bias, Variance, Comparing different Models to find the Best fit, Anomaly Detection, Forecasting, Deep Learning with IoT data; Strategies to organize data for Analytics; The Economics of IoT Analytics: Cost Considerations for IoT Analytics
IoT Analytics Applications and Case Studies: Data Analytics in Smart Buildings, Internet-of-Things Analytics for Smart Cities, Ethical IoT
John Soldatos, “Building Blocks for IoT Analytics”, River Publishers, 2017
Andrew Minteer, “Analytics for the Internet of Things”, Packt Publishing, 2017
On successful completion of this course the students will be able to-
Understand IoT Analytics Lifecycle and Techniques
Know the characteristics of IoT Generated Data
Use development tools for IoT Analytics Applications
Learn Machine Learning for IoT data
Understand IoT Data Analytics applications
The objective of this course is to develop understanding of the two most important network technologies that will transform networks operated by Carrier Service Providers: Software Defined Networking (SDN) and Network Functions Virtualization (NFV).
Software Defined Networks: Background and Motivation, Evolving Network Requirements, The SDN Approach, SDN Architecture, SDN- and NFV-Related Standards
SDN Data Plane and OpenFlow: SDN Data Plane Functions and Protocols, OpenFlow Logical Network Device, OpenFlow Protocol; SDN Control Plane: SDN Control Plane Architecture, ITU-T Model, OpenDaylight, REST, Cooperation and Coordination Among Controllers; SDN Application Plane: SDN Application Plane Architecture, Network Services Abstraction Layer, Traffic Engineering, Measurement and Monitoring, Security, Data Center Networking, Information-Centric Networking
Network Functions Virtualization: Concepts and Architecture, Background and Motivation for NFV, Virtual Machines, NFV Concepts, NFV Benefits and Requirements, NFV Reference Architecture; NFV Functionality: NFV Infrastructure, Virtualized Network Functions, NFV Management and Orchestration, NFV Use Cases, SDN and NFV; Network Virtualization: Virtual LANs, OpenFlow VLAN Support, Virtual Private Networks, Network Virtualization, Software-Defined Infrastructure
Defining And Supporting User Needs: Quality of Service, QoS Architectural Framework, Integrated Services Architecture, Differentiated Services, Service Level Agreements, IP Performance Metrics, OpenFlow QoS Support; QoE: User Quality of Experience: QoE, Service Failures Due to Inadequate QoE Considerations, Definition of Quality of Experience, Factors Influencing QoE, Measurements of QoE, Applications of QoE
Security: Security Requirements, SDN Security, NFV Security, Cloud Security, IoT Security
William Stallings, “Foundations of Modern Networking”, Pearson Education, 2016
Paul Goransson, “Software Defined Networks A Comprehensive Approach”, Morgan Kaufmann, Elsevier
Thomas D. Nadeau, Ken Gray, “Software Defined Networks”, O’Reilly
Guy Pujolle, “Software Networks”, Wiley
On successful completion of this course the students will be able to-
Have knowledge of SDN concepts and technology
Know about the application areas that can be supported by SDN and provides a number of examples of SDN applications
Discuss NFV concepts, technology, and applications, as well as network virtualization
Understand quality of service (QoS) and quality of experience (QoE) to determine customer needs and network design responses to those needs
Analyse the security issues that have emerged with the evolution of SDN and NFV