Type of Credit: Partially Required
Credit(s)
Number of Students
This course first introduces the IIoT (Industrial Internet of Things), the related technologies, and development trends, to help students understand related applications. Next, the architectures and components of the IIoT are introduced, from sensing, collection, transmission, to processing, as well as related protocols and corresponding cybersecurity issues, so that students can have a comprehensive understanding of the IIoT. Then the course introduces the cybersecurity architectures and the international standards of OT (Operation Technology), and illustrates the application of OT security protection through cases. The course also plans to visit IIoT-related enterprise to enhance the industry-university connection of the course and promote students' outlook.
能力項目說明
1. Understand and analyze the concepts of IIoT systems.
2. The ability to integrate across domains and analyze information security issues in the field of IIoT.
3. The ability to explore problems, analyze, summarize, and solve problems.
4. Understand the development trends of IIoT cybersecurity and international standards.
教學週次Course Week | 彈性補充教學週次Flexible Supplemental Instruction Week | 彈性補充教學類別Flexible Supplemental Instruction Type |
---|---|---|
Note: Course schedule may change, please refer to moodle.
週次 Week |
課程主題 Topic |
課程內容與指定閱讀 Content and Reading Assignment |
教學活動與作業 Teaching Activities and Homework |
學習投入時間 Student workload expectation |
|
課堂講授 In-class Hours |
課程前後 Outside-of-class Hours |
||||
01 09/11 |
Intro. to IIoT |
Syllabus. Overview of Internet of Things. |
|
3 |
2 |
02 09/18 |
Intro. to IIoT |
Introduction to IIoT and Industry 4.0. |
|
3 |
3 |
03 09/25 |
Intro. to IIoT |
Industry 4.0 Basics. IIoT Basics. |
V |
3 |
2 |
04 10/02 |
Intro. to IIoT |
Business Models and Reference Architecture of IIoT |
|
3 |
3 |
05 10/09 |
IIoT Tech. and Security |
Off-Site Technologies and Security Issues |
V |
3 |
2 |
06 10/16 |
IIoT Tech. and Security |
On-Site Technologies and Security Issues |
|
3 |
3 |
07 10/23 |
Sensors |
Sensors. Actuators |
|
3 |
2 |
08 10/30 |
Midterm |
Midterm |
|
3 |
4 |
09 11/06 |
Actuators & Industrial Data Transmission and Security |
Actuators & Industrial Data Transmission and Security |
V |
3 |
2 |
10 11/13 |
IoT Security Forum |
IoT Security Forum |
|
3 |
2 |
11 11/20 |
Industrial Data Transmission and Security |
Industrial Data Transmission and Security |
|
3 |
2 |
12 11/27 |
Industrial Data Acquisition and Control. Corporate Visit @ 11/29 |
Industrial Data Acquisition and Control. Corporate Visit @ 11/29 |
V |
3 |
3 |
13 12/04 |
IIoT Analytics and Data Science & Plant Safety and Security. |
IIoT Analytics and Data Science & Plant Safety and Security |
|
3 |
2 |
14 12/11 |
Cybersecurity Standards in IACS |
International Cybersecurity Standards for OT in Industrial Automation and Control Systems. |
V |
3 |
3 |
15 12/18 |
Term Project Presentation |
Term Project Presentation |
|
3 |
2 |
16 12/25 |
Industrial guest lecturer co-teaching |
Industrial guest lecturer co-teaching |
|
3 |
4 |
17 01/01 |
New Year's holiday |
New Year's holiday |
|
0 |
0 |
18 01/09 |
Flexible Supplemental Instruction Week |
Course-related online learning |
|
0 |
3 |
The scoring criteria are tentatively set as follows:
Homework: 50%
Midterm: 20%
Term Project: 30%
This course is conditionally allowed to use Generative AI tools:
If students use Generative AI tools, they need to briefly explain how to use Generative AI for topic development, sentence polishing, or structural reference in the "footnote of title page" or "references" in the assignments or reports.
If the student uses Generative AI tools but does not indicate them in the assignments or reports, the teacher has the right to regrade or deny the assignments or reports.
Students taking this course will be deemed to have agreed to the above statement of conditional open use of Generative AI tools when registering for the course.
The teacher will provide course slides, and the following are reference books.
1. Introduction to Industrial Internet of Things and Industry 4.0, 1st ed., 2020. (Sudip Misra, Chandana Roy, and Anandarup Mukherjee. CRC Press).
2. Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment, 2nd ed., 2021. (Pascal Ackerman. Packt Publishing)
3. Hands-On Industrial Internet of Things: Create a Powerful Industrial IoT Infrastructure Using Industry 4.0, 2018. (Giacomo Veneri and Antonio Capasso. Packt Publishing).
4. IoT and Edge Computing for Architects: Implementing Edge and IoT Systems from Sensors to Clouds with Communication Systems, Analytics, and Security, 2nd ed., 2020. (Perry Lea. Packt Publishing).
書名 Book Title | 作者 Author | 出版年 Publish Year | 出版者 Publisher | ISBN | 館藏來源* | 備註 Note |
---|---|---|---|---|---|---|
Introduction to Industrial Internet of Things and Industry 4.0 | Sudip Misra, Chandana Roy, and Anandarup Mukherjee | 2020 | CRC Press | 036789758X | 圖書館處理 | |
Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment | Pascal Ackerman | 2021 | Packt Publishing | 1800202091 | 圖書館處理 | |
Hands-On Industrial Internet of Things: Create a Powerful Industrial IoT Infrastructure Using Industry 4.0 | Giacomo Veneri and Antonio Capasso | 2018 | Packt Publishing | 1789537223 | 圖書館處理 | |
IoT and Edge Computing for Architects: Implementing Edge and IoT Systems from Sensors to Clouds with Communication Systems, Analytics, and Security | Perry Lea | 2020 | Packt Publishing | 1839214805 | 圖書館處理 |