Back close

Course Detail

Course Name Cybersecurity for Automotive Systems
Course Code 24AT735
Program M. Tech. in Automotive Engineering
Credits 3
Campus Coimbatore , Chennai , Bengaluru , Amritapuri , Kochi

Syllabus

Elective Streams Software Defined Vehicles

Unit 1

Network security concepts – Introduction to Number Theory – Classical encryption techniques – Block ciphers – Data Encryption Standard (DES) – Finite fields – Advanced Encryption Standard (AES) – Stream ciphers.

Unit 2

Functions and code schemes:-Asymmetric ciphers – Public-key cryptography – Rivest-Shamir – Adleman (RSA) scheme- Elliptic curve cryptography – Cryptographic Data Integrity Algorithms- Hash functions- Message Authentication Codes (MAC)- Digital signatures – PKI, Mutual Trust – Key management and distribution – User authentication.

Unit 3

Network Security – Network Access Control and authentication protocols – Transport-level security – Wireless network security – IP security – Security and privacy – preserving mechanisms in vehicular networks. Block chain for automotive security – vehicle data safety – Immutable Decentralized technology – transparency and security.

Objectives and Outcomes

Course Objectives

  1. To introduce the fundamental principles of cryptography and security.
  2. To provide a strong mathematical foundation for cryptography and  security.
  3. To impart an understanding of the security mechanisms currently used in practice at various networking layers.

Course Outcomes

CO CO Description
CO1 Apply the fundamental principles behind cryptography and security
CO2 Implement the concepts of public key cryptography for different use cases.
CO3 Acquire knowledge on encryption techniques.
CO4 Analyse various protocols for network security.

CO-PO Mapping

PO1 PO2 PO3 PO4 PO5
CO1 1 3
CO2 1 3
CO3 1 3
CO4 1 1 3

Skills acquired

Acquire fundamentals including encryption techniques, cryptographic protocols, and privacy measures for various networks, gaining skills in symmetric and asymmetric encryption, digital signatures, authentication, and privacy preservation.

Text Books / References

Text Books / References

  1. William Stallings, “Cryptography and Network Security”, 8th , Pearson, 2021
  2. Xiaodong Lin, Rongxing Lu, “Vehicular Ad Hoc Network Security and Privacy”, Wiley, 2015.
  3. David Forster, “Verifiable Privacy Protection for Vehicular Communication Systems”, Springer, 2017

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now