Search

REEDEAM

REEDEAM is a project where Luleå University of Technology, Mälardalen University and Örebro University, and industry will co-produce education for the business community’s climate transition. The project aims to strengthen cooperation between universities and industry by improving access to demand-driven competence development. REEDEAM also aims to establish long-term cooperation between the universities based on their scientific areas of expertise. A planned research school will provide the business community with greater access to doctoral competence and further strengthen the universities’ cooperation with the surrounding industry and society. Lessons learned, and experiences from the KK Foundation’s expert competence program are integrated to ensure efficiency and quality by creating a cohesive competence offering.

Cybersecurity for the Internet of Things (IoT)

The Internet of Things (IoT) is a networking paradigm which enables different devices (from thermostats to autonomous vehicles) to collect valuable information and exchange it with other devices using different communications protocols over the Internet. This technology allows to analyse and correlate heterogeneous sources of information, extract valuable insights, and enable better decision processes. Although the IoT has the potential to revolutionise a variety of industries, such as healthcare, agriculture, transportation, and manufacturing, IoT devices also introduce new cybersecurity risks and challenges. In this course, the students will obtain an in-depth understanding of the Internet of Things (IoT) and the associated cybersecurity challenges. The course covers the fundamentals of IoT and its applications, the communication protocols used in IoT systems, the cybersecurity threats to IoT, and the countermeasures that can be deployed. The course is split in four main modules, described as follows: Understand and illustrate the basic concepts of the IoT paradigm and its applications Discern benefits and drawback of the most common IoT communication protocols Identify the cybersecurity threats associated with IoT systems Know and select the appropriate cybersecurity countermeasures Course Plan Module 1: Introduction to IoT Definition and characteristics of IoT IoT architecture and components Applications of IoT Module 2: Communication Protocols for IoT Overview of communication protocols used in IoT MQTT, CoAP, and HTTP protocols Advantages and disadvantages of each protocol Module 3: Security Threats to IoT Overview of cybersecurity threats associated with IoT Understanding the risks associated with IoT Malware, DDoS, and phishing attacks Specific vulnerabilities in IoT devices and networks Module 4: Securing IoT Devices and Networks Overview of security measures for IoT systems Network segmentation, access control, and encryption Best practices for securing IoT devices and networks Organisation and Examination Study hours: 80 hours distributed over 6 weeks Scehduled online seminars:  February 6th 2025, from 13:15 to 16:00 February 26th 2025, from 13:15 to 16:00 March 12th 2025, from 13:15 to 16:00 Examination, one of the following: Analysis and presentation of relevant manuscripts in the literature Bring your own problem (BYOP) and solution. For example, analyse the cybersecurity of the IoT network of your company and propose improvements The number of participants in the course is limited, so please hurry with your application!