Skip to main content

IoT communication and information securityLaajuus (4 cr)

Code: TTC8240

Credits

4 op

Teaching language

  • Finnish

Responsible person

  • Jari Hautamäki

Objective

Course objectives
You learn to plan and implement the IT solutions required by the IoT system.

You understand the significance of IoT data communication protocols, wireless data communication and data security in the digitalizing operating environment. You understand the limitations of the usage of wireless technologies and are able to outline the potential application for each technology. You are able to apply them to practice when implementing data secure IoT systems,

EUR-ACE Engineering Practice
EUR-ACE: Knowledge and understanding 

Content

IoT data communication protocols
- MQTT

Wireless technologies
- NFC, BT, Wifi, LORA, GSM 4&5, Sigfox, Zigbee, ...

IoT data security
- wireless sensors
- data communication in cloud
- cloud services
- Control (cloud -> actuator)

Qualifications

Introduction to IoT systems
Basics in Programming
Use and command of Linux
Cyber security
Data networks

Assessment criteria, satisfactory (1)

Sufficient: The student knows the most common data communication solutions for IoT systems and their potential applications. The student knows the security threats related to data communication solutions.

Satisfactory: The student knows the most common data communication solutions for IoT systems and how to apply them. The student is able to assess the data security of the implemented solutions.

Assessment criteria, good (3)

Good 3: The student is able to design and implement simple practical data secure data communication solutions for an IoT system. The student is able to assess the data security of the implemented solutions.

Very good 4: The student is able to design and implement versatile data secure data communication solutions for an IoT system.

Assessment criteria, excellent (5)

Excellent: The student is able to design and implement a demanding IoT system with all its parts. The student is able to assess the data security of their solutions in depth.