UnivIS
Informationssystem der Friedrich-Alexander-Universität Erlangen-Nürnberg © Config eG 
FAU Logo
  Sammlung/Stundenplan    Modulbelegung Home  |  Rechtliches  |  Kontakt  |  Hilfe    
Suche:      Semester:   
 
 Darstellung
 
Druckansicht

 
 
Modulbeschreibung (PDF)

 
 
 Außerdem im UnivIS
 
Vorlesungs- und Modulverzeichnis nach Studiengängen

Vorlesungsverzeichnis

 
 
Veranstaltungskalender

Stellenangebote

Möbel-/Rechnerbörse

 
 

Security and Privacy in Pervasive Computing (SecPriPC)5 ECTS
(englische Bezeichnung: Security and Privacy in Pervasive Computing)

Modulverantwortliche/r: Zinaida Benenson
Lehrende: Zinaida Benenson


Startsemester: WS 2015/2016Dauer: 1 SemesterTurnus: jährlich (WS)
Präsenzzeit: 60 Std.Eigenstudium: 90 Std.Sprache: Deutsch

Lehrveranstaltungen:


Empfohlene Voraussetzungen:

Basic knowledge in the area of IT security and privacy, such as security goals (CIA), symmetric and asymmetric cryptography principles, PKI, basic functionality of SSL is required. This knowledge can be acquired through the attendance of the module “Applied IT Security” (Angewandte IT Sicherheit) or similar modules.

Es wird empfohlen, folgende Module zu absolvieren, bevor dieses Modul belegt wird:

Angewandte IT-Sicherheit (Master) (WS 2014/2015)


Inhalt:

Pervasive Computing, also called Ubiquitous Computing, is a computing paradigm that comprises billions computing devices integrated into everyday objects and connected into a global communication network that is orders of magnitude larger than the Internet today. These devices measure environmental characteristics, exchange information about their surroundings and interact with people in many different ways, such that sometimes people may be even unaware that they are using computers. The era of pervasive computing has already started and moves on rapidly, integrating the Internet, smartphones, wearable computing devices (such as Google glass or Apple Watch), smart grid, home automation, intelligent cars and smart cities.

In this course we look at the visions and current scenarios of Pervasive Computing from the security and privacy point of view. We consider security mechanisms and privacy concerns of the present-day technologies, such as smartphone operating systems, GSM/UMTS, WLAN, Bluetooth, ZigBee, RFID, and also of present and envisioned systems and services such vehicular networks, sensor networks, location-based services and augmented reality.

The exercise comprises student presentations on selected topics, such as specific security and privacy mechanisms or specific attacks. Materials such as papers and key discussion questions will be provided. The students will be divided into groups, and each group will prepare a 25-minutes long presentation (possibly with a demo), and lead a 20-minutes long discussion with the class on a given topic. The exercise will also feature a number of guest talks by experts on current security and privacy issues in pervasive computing systems.

Lernziele und Kompetenzen:

The students achieve the main module goals if they are able to:

  • recognize existing and future computing systems as pervasive through analysis of their conceptual design and development, deployment and actual usage

  • critically appraise pervasive computing systems for typical security- and privacy-related concerns and weaknesses in design, deployment and usage

  • choose appropriate techniques and policies for securing pervasive computing systems

  • choose appropriate techniques and policies for addressing privacy issues in pervasive computing systems

Literatur:

  • Frank Stajano: Security for Ubiquitous Computing.
  • John Krumm (Ed.): Ubiquitous Computing Fundamentals

  • Adam Greenfield: Everyware

Other books and papers will be presented during the lecture.


Verwendbarkeit des Moduls / Einpassung in den Musterstudienplan:
Das Modul ist im Kontext der folgenden Studienfächer/Vertiefungsrichtungen verwendbar:

  1. Informatik (Bachelor of Arts (2 Fächer))
    (Po-Vers. 2010 | Vertiefung Informatik I und II | Vertiefungsmodul IT-Sicherheit)
  2. Informatik (Bachelor of Arts (2 Fächer))
    (Po-Vers. 2013 | Vertiefung Informatik I und II | Vertiefungsmodul IT-Sicherheit)
  3. Informatik (Bachelor of Science)
    (Po-Vers. 2009s | Wahlpflichtbereich (5. und 6. Semester) | Wahlpflichtmodule | Vertiefungsmodul IT-Sicherheit)
  4. Informatik (Bachelor of Science)
    (Po-Vers. 2009w | Wahlpflichtbereich (5. und 6. Semester) | Wahlpflichtmodule | Vertiefungsmodul IT-Sicherheit)
  5. Informatik (Master of Science)
    (Po-Vers. 2010 | Wahlpflichtbereich | Säule der systemorientierten Vertiefungsrichtungen | Vertiefungsmodul IT-Sicherheit)
  6. Mathematik (Bachelor of Science)
    (Po-Vers. 2015w | Module des Nebenfachs | Nebenfach Informatik | Vertiefungsmodule | Vertiefungsmodul IT-Sicherheit)

Studien-/Prüfungsleistungen:

Security and Privacy in Pervasive Computing (Vorlesung mit Übung) (Prüfungsnummer: 327615)
Prüfungsleistung, mündliche Prüfung, Dauer (in Minuten): 30, benotet
Anteil an der Berechnung der Modulnote: 100.0 %

Erstablegung: WS 2015/2016, 1. Wdh.: SS 2016, 2. Wdh.: keine Wiederholung
1. Prüfer: Zinaida Benenson

UnivIS ist ein Produkt der Config eG, Buckenhof