LECTURE 1: Introduction to IoT: definitions, history, today's smart objects, challenges for smart objects (at
node/network levels), standardization, technology trends and market growth.
LECTURE 2: Introduction to IoT: hardware, software, testbed at WASN Lab.
Transport Layer Protocols: UDP and TCP: design principles, details of UDP and TCP, UDP and TCP for smart objects.
LECTURE 3: IPv6: the evolution of Internet, IP protocol stack, IPv6 characteristics (headers, addressing, etc.).
LECTURE 4: Communication Mechanisms: communication patterns, communication protocols (IEEE 802.15.4, IEEE 802.11, PLC).
LECTURE 5: Energy-efficient MAC protocols: power consumption, problems in wireless networking (hidden/exposed terminal, near-far), centralized access, traditional contention protocols, energy
efficient MAC protocols-unscheduled (MACA, PAMAS, STEM, B-MAC, WiseMAC, X-MAC) and scheduled (S-MAC,ContikiMAC).
LECTURE 6: 6LoWPAN: a LoWPAN, the adaptation layer, header structure, header compression.
LECTURE 7: Routing in LLNs & RPL: From WSNs to RPL; link model in LLNs, routing requirements, RPL approach; metrics, constraints, objective function; RPL basics, operations, multiple DODAGs; DIO and DAO messages; an example of DAG construction and maintenance.
LECTURE 8: Communication paradigms for the IoT: REST architecture, Web of Things, Publish/Subscribe.
LECTURE 9: Operating systems and hardware for the IoT: Hardware overview; classes of constrained devices; main IoT boards; sensors and actuators; media types for Sensor Markup Language (SENML); CoRE interfaces; operating systems for IoT.
LECTURE 11: Service Discovery: CoAP service discovery; resource discovery; ZeroConf; jMDNS; "Lightweight multicast forwarding for service discovery in low-power IoT networks"; scalable and self-configuring architecture for service discovery in the Internet of Things.
LECTURE 12: Security for IoT: threats and coutermeasures; IP layer security (IPSec, HIP); transport layer security (TLS, DTLS); application layer security (S/MIME, SRTP); key agreement and distribution; cryptographic algorithms.
LECTURE 13: Q&A on the theory part.