Hasso-Plattner-Institut25 Jahre HPI
Hasso-Plattner-Institut25 Jahre HPI

Security for the Internet of Things (Sommersemester 2017)

Dozent: Prof. Dr. Christoph Meinel (Internet-Technologien und -Systeme) , Konrad-Felix Krentz (Internet-Technologien und -Systeme)

Allgemeine Information

  • Semesterwochenstunden: 4
  • ECTS: 6
  • Benotet: Ja
  • Einschreibefrist: 28.04.2017
  • Lehrform: Seminar / Projekt
  • Belegungsart: Wahlpflichtmodul

Studiengänge, Modulgruppen & Module

IT-Systems Engineering MA
  • ISAE: Internet, Security & Algorithm Engineering
    • HPI-ISAE-S Spezialisierung
  • ISAE: Internet, Security & Algorithm Engineering
    • HPI-ISAE-T Techniken und Werkzeuge
  • OSIS: Operating Systems & Information Systems Technology
    • HPI-OSIS-K Konzepte und Methoden
  • OSIS: Operating Systems & Information Systems Technology
    • HPI-OSIS-S Spezialisierung
  • OSIS: Operating Systems & Information Systems Technology
    • HPI-OSIS-T Techniken und Werkzeuge
  • IT-Systems Engineering
    • HPI-ITSE-A Analyse
  • IT-Systems Engineering
    • HPI-ITSE-E Entwurf
  • IT-Systems Engineering
    • HPI-ITSE-K Konstruktion
  • IT-Systems Engineering
    • HPI-ITSE-M Maintenance


Interconnecting embedded devices with the Internet leads to the so-called Internet of things (IoT). The Internet of things is envisioned to realize fascinating applications, such as smart cities, predictive maintenance, and precision agriculture. These applications will involve large numbers of embedded devices that communicate with each other and remote hosts.

Securing the IoT is of paramount importance, but many security issues persist. This year's edition of this seminar mainly focusses on denial-of-sleep attacks. Such attacks aim at expending the limited energy reserves of battery-powered and energy-harvesting IoT devices.

Lern- und Lehrformen

Students will work in teams of about 2 persons. Each team will choose a specific project to work on. There will be an intermediate presentation, where each team primarily presents related work, and a final presentation, where each team presents its results. Furthermore, each team is supposed to author a paper and create a prototypical implementation.


The final grade will be based on the intermediate presentation, the final presentation, the final paper, as well as the implementation.