Internet of Things - Devices, Networks, AI, and Security
Immerse yourself into the Internet of Things technology, covering IoT system design from devices and networking to data analytics with AI and security implementation!
The Internet of Things (IoT) is not just a buzzword, it's a paradigm shift in the world of information systems. This course, designed for professionals with a background in computer engineering or related technical fields, offers a comprehensive exploration of IoT technologies and applications. Participants will engage with key concepts in IoT device architecture, network protocols, data analytics, generative AI integration, and security measures. By examining real-world case studies and current research, participants will advance their knowledge and skills in IoT system design. The course equips professionals to design and optimize IoT solutions, driving innovation in smart manufacturing, industrial automation, and connected systems. In this rapidly evolving field, this course is your key to staying ahead.
The Internet of Things potential
IoT encompasses a network of interconnected devices embedded with sensors and software, enabling data collection and analytics. IoT technology's prominence stems from low-power, embedded devices, wireless communication, internetworking, data analytics potential, and automation capabilities. IoT applications span smart cities, industrial optimization, healthcare, and energy management. Its convergence with AI and 5G further enhances its transformative potential across sectors. While offering improved efficiency and user experiences, IoT also presents data security and privacy challenges, driving ongoing research and development in this rapidly evolving field.
The potential of working with IoT for information systems is immense, and we are here to help you tap into it. This engaging theoretical and hands-on course, led by Electrical and Computer Engineering experts, offers participants a unique opportunity to explore the practical applications of IoT technologies. You will gain insights into implementing IoT solutions across various domains through interactive sessions and hands-on examples, making the theoretical knowledge immediately applicable in your professional life.
In this course, you will work with
• IoT data flows and their characteristics
• Constraints of embedded devices
• Energy efficiency and scalability of IoT systems
• Wireless IoT networks and protocols
• Message passing and IoT middleware
• Data collection, storage, integration, and processing
• Web technologies for IoT systems
• IoT network security
• Integration of IoT with generative AI (GenAI), large language models (LLM) and retrieval-augmented generation (RAG)
After the course, you will be able to
• Explain how to design an IoT system from sensing to cloud
• Analyze the scalability, energy efficiency, and security of IoT systems
• Explain wireless technologies and networking aspects of IoT
• Familiarize with design tools to analyze IoT devices and networks
• Hand-on experience with the development of an IoT data flow, networks and integration with GenAI
The course requires active participation and collaboration. It will consist of preparation/reading and discussion of academic literature, theory presentations, and practical in-class laboratory exercises.
Program
Day 1 12 november from 9 to 16
• IoT network and service architecture and use cases
• Constrained IoT devices and design for energy-efficiency
• IoT data flows and their characteristics
• Introduction to Node-RED
• Message oriented-middleware and MQTT
• Time-series data and databases
• Constrained RESTful web technology
Day 2 13 november from 9 to 16
• IoT networks: communication models, mesh, and star topology
• Internet Protocol version 6 (IPv6) introduction
• 6LoWPAN adaption layer: fragmentation, header compression, and mesh networking
• Introduction to Contiki-NG and the uIP stack
• Routing in IoT networks and RPL protocol
• Thread, Matter, and interoperability
Day 3 14 november from 9 to 16
• IoT threat analysis
• IoT security architectures and security mechanisms
• Wireless security for IoT (IEEE 802.15.4 security)
• Public key cryptography for IoT (PKI, DPKI)
• Decentralized identity and IoT blockchains
• IoT and Web 3.0
• Leveraging IoT data analytics with GenAI/LLM/RAG
The course hosts lunch and water; otherwise, no catering is included
Competences and prerequisites
• The course aims at those working with software in engineering functions or who have experience and skills in programming, preferably experience with embedded development.
• You must be affiliated with an organization.
• Bring a laptop computer with free storage space for the practical sessions. Instructions on preferred software installation will be distributed before the course.
Price
You can participate in the course if you come from an SME or a public organization.
SMEs receive State aid under the Deminimis Regulation. As an SME, you must state whether the company has received support within the last 3 years in the deminimis framework. The price is DKK 6057 (plus VAT) if you are from a large enterprise. Read more about deminimis or contact Erhvervshus Midtjylland, read more on the right side.
Language
This 3-day course is conducted in English.
The specialist course has been developed by Aarhus University in collaboration with TechCircle and the Engineering Association IDA. Highly specialized expertise from the university environment is included in the implementation of the courses.
The Course is fully booked.
Oversigt
- 12. nov. 2024
- 09.00 -16.00
- Aarhus University, Building 5123, room 314, 2nd floor, Helsingforsgade 10, 8200 Aarhus N
- Free
Aarhus Universitet
Jesper Askov Bonde Pedersen
jesper.askov@ece.au.dk
Tlf.: (+45) 93 50 89 48
Kontakt TechCircle
Hvis du har spørgsmål ang. deltagelse eller Deminimis, så kontakt Erhvervshus Midtjylland