This course teaches basic concepts and practices in the development of IoT Prototypes for real-world applications. It deals with connectivity, and building systems to enable delivery of software services networked to the cloud platforms. Concepts of mobile and wireless systems are an integral component of the course.
This course teaches basic concepts and practices in the development of IoT Prototypes for real-world applications. It deals with connectivity, and building systems to enable delivery of software services networked to the cloud platforms. At the end of the course, the students will be in a position to launch an IoT product.
Your final grade will be a weighted average of:
Exams I and II – 40%
Assignments – 20%
Presentations – 20%
Projects – 20%
Your final grade will be:
Grade A : 4.000 : ≥ 90%
Grade A − : 3.667 : ≥ 80% and < 90%
Grade B + : 3.333 : ≥ 70% and < 80%
Grade B : 3.000 : ≥ 60% and < 70%
Grade B − : 2.667 : ≥ 50% and < 60%
Grade C + : 2.333 : ≥ 40% and < 50%
Grade C : 2.000 : ≥ 30% and < 40%
Grade C − : 1.667 : ≥ 20% and < 30%
Grade D + : 1.333 : ≥ 10% and < 20%
Grade D : 1.000 : > 0% and < 10%
Grade F : 0.000 : ≤ 0%
Note: The above percentages are tentative. There may be significant changes.
Venue: Carbondale Campus Campus | Engineering, A Wing | Room 0207
Time Slots: Monday, Wednesday, and Friday - 09:00 AM - 09:50 AM
Monday, Wednesday, and Friday - 10:00 A.M. - 12:00 P.M.
Approx. Semester Plan - Click here
Prerequisites:
Familiarity with programming in a C-family language (C, C++), Java and Python.
Basic understanding of Networking, Operating Systems, Algorithms, Data Structures, Computer Organizations, and Computer Architectures is expected.
Attendance Expectations:
Attendance at every lecture is mandatory.
Students must arrive on time, stay for the entire class period, and actively participate in in-class activities.
Lateness, early departure, and non-participation are highly discouraged.
Course Format:
Lectures, discussions, programming assignments, and a final project are integral parts of the course.
Both individual and group activities enhance understanding of theoretical concepts and practical skills in distributed systems development.
CS Department Lab Hours:
The CS Department lab is unavailable during evenings and weekends.
Students must plan their work accordingly if they intend to use the lab facilities.
Electronic Lab Submission:
Instructions will be provided for electronically submitting labs and programs for grading.
Failure to adhere to instructions may result in a score of zero for labs.
Assessment:
Evaluation includes programming assignments, quizzes, exams, and the final project.
Active participation in class discussions and group activities is also assessed.
Quizzes and Assignments:
Regular quizzes and assignments assess comprehension of course material.
Implementing and practicing code snippets and problems discussed in class is expected.
Importance of Assignments:
Completing assignments is crucial for effective learning and successful exam performance.
Timely Completion:
Initiating projects and assignments promptly is crucial to meet deadlines, which will be strictly enforced.
Late Submissions Policy:
Late submissions result in penalties.
The maximum attainable score decreases by 20% for each day of late submission following the deadline.
Exam Integrity:
Exams must be completed independently, without assistance or communication.
Dates will be posted and may change.
Exams cover cumulative concepts from readings, course materials, and activities.
Missing an exam without sufficient documentation results in a score of 0.
In emergencies with appropriate documentation, alternative arrangements may be considered.
Understanding Cheating:
Cheating on programming assignments is a significant concern.
Familiarize yourself with the CS Department's webpage on Academic Dishonesty, which provides detailed definitions of cheating.
Consequences of Cheating:
Cheating results in a zero for the assignment, potentially affecting eligibility for exams.
A second violation leads to an immediate 'F' for the course.
Academic Integrity Code:
Students must uphold academic honesty.
Any involvement in copying during quizzes, midterms, or final exams results in a zero for the respective exam.
Syllabus Change Policy:
The syllabus is a guide and may be modified with prior notice.
Textbook Requirement:
Access to designated textbooks is mandatory.
Students are expected to read assigned sections, as material from the texts may be included in assessments, even if not covered in lectures.
Textbooks
Introduction to IoT, S. Mishra, A. Mukherjee and A. Roy, Cambridge University Press.
Internet of Things: Architecture and Design Principles, Raj Kamal, McGraw Hill Education.
References
Data Communications and Networking, Forouzan (4th ed. and 5th ed.)
Wireless Communication and Networking, William Stallings (2nd ed.)
TCP/IP Protocol Suite, Forouzan (4th ed.)
Mobile Communications, Jochen Schiller (2nd ed.)
Future References
Internet of Things: Principles and Paradigms, Rajkumar Buyya and Amir Vahid Dastjerdi, MK Elsevier.
Internet of Things: A Hands-on Approach, Arshdeep Bahga and Vijay K. Madisetti, Universities Press.
The Internet of Things: Enabling Technologies, Platforms, and Use Cases, Pethuru Raj and Anupama C. Raman, CRC Press.
An introduction to IoT analytics, H. G. Perros, CRC press.
Note: The lectures, homework assignments, quizzes, and other announcements will be made available through Email, D2L, and the course webpage. Posting any course materials, including solutions, homework, and labs, on public websites without permission is a violation of course policy and the instructor’s copyright.
Southern Illinois University Carbondale (SIUC) is committed to fostering a welcoming and inclusive campus environment, ensuring a space free from discrimination and intimidation for all. The university offers essential support for students with disabilities through the Office for Access and Accommodations and provides tailored assistance to military community members via Veterans Services. The Student Multicultural Resource Center champions diversity and inclusion, while the Saluki Cares program offers a robust support network for students in distress. SIUC prioritizes safety and awareness, maintaining strict policies against violence and harassment under Title IX, and offers mental health services through Counseling and Psychological Services (CAPS). Additionally, the university provides extensive academic support, including tutoring, writing assistance, and advisement, to help students succeed. For more details, please refer to the Syllabus Attachment for Fall 2025.
Introduction to IoT.
IoT Sensing and Actuation: Operational principle of sensors and actuators.
Connectivity Technologies for IoT: Operational principles of IEEE 802.15.4, Zigbee, RFID, NFC, LoRa, NB-IoT, Wi-Fi, WiMAX, BT, GSM, LTE, 5G, Satellite, etc.
Approx. Number of Classes - 12
Textbooks
"Introduction to IoT" by S. Mishra, A. Mukherjee and A. Roy (Cambridge University Press)
Chapter 1 Basics of Networking
Chapter 3 Predecessors of IoT
Chapter 4 Emergence of IoT
Chapter 5 IoT Sensing and Actuation
Chapter 7 IoT Connectivity Technologies
References
"Internet of Things: Architecture and Design Principles" by Raj Kamal (McGraw Hill Education)
Chapter 1 Internet of Things: An Overview
Chapter 2 Design Principles for Connected Devices
Chapter 7 Sensors, Participatory Sensing, RFIDs, and Wireless Sensor Networks
Chapter 8 Prototyping the Embedded Devices for IoT and M2M
"Data Communications and Networking" by Forouzan (5th ed.)
Chapters 15 and 16
"Wireless Communication and Networking" by William Stallings (2nd ed.)
Chapters 9, 10, 13, 14 and 15
Communication Technologies and Interoperability for IoT: Low power and lossy network (LLN); Infrastructure Protocols: LOADng, RPL, 6LoWPAN, QUIC, μIP, and CCN; Discovery Protocols: mDNS, UPnP; Data Protocols: MQTT, MQTT-SN, CoAP, and AMQP; Identification Protocols: EPC, and uCode; Interoperability.
Mobility management in IoT: Introduction to mobility management, handovers in wireless networks, Mobile IP and Mobile TCP.
Approx. Number of Classes - 9
Textbooks
"Introduction to IoT" by S. Mishra, A. Mukherjee and A. Roy (Cambridge University Press)
Chapter 4 Emergence of IoT
Chapter 8 IoT Communication Technologies
Chapter 9 IoT Interoperability
References
"Internet of Things: Architecture and Design Principles" by Raj Kamal (McGraw Hill Education)
Chapter 3. Design Principles for Web Connectivity
Chapter 4. Internet Connectivity Principles
"Data Communications and Networking" by Forouzan (4th ed.)
Chapters 19, 20, 23 and 24
"TCP/IP Protocol Suite" by Forouzan (4th ed.)
Chapter 10
"Mobile Communications" by Jochen Schiller (2nd ed.)
Chapter 9
IoT security: Definition, notion of secrecy throughput, different types of security threats in IoT (e.g., Eavesdropping, Spoofing, Jamming). GSM, WLAN and Bluetooth Security protocols.
IoT System Management and Virtualization: IoT environment management over Cloud computing framework, Fog Computing paradigm for IoT, Softwarized control and virtualization technologies (SDN and NVF) for IoT network and computation resource management.
Data Acquiring, Organising, Processing and Analytics: Data Acquiring and Storage, Organising the data, Transactions, Business Processes, Integration and Enterprise system, Analytics, and Knowledge Acquiring, Managing and Storing Processes.
Approx. Number of Classes - 9
Textbooks
"Introduction to IoT" by S. Mishra, A. Mukherjee and A. Roy (Cambridge University Press)
Chapter 2 Basics of Network Security
Chapter 6 IoT Processing Topologies and Types
Chapter 10 Cloud Computing
Chapter 11 Fog Computing and Its Applications
References
"Internet of Things: Architecture and Design Principles" by Raj Kamal (McGraw Hill Education)
Chapter 5 Data Acquiring, Organising, Processing and Analytics
Chapter 6 Data Collection, Storage and Computing Using a Cloud Platform
Chapter 9 Prototyping and Designing the Software for IoT Applications
Chapter 10 IoT Privacy, Security and Vulnerabilities Solutions
Chapter 11 Business Models and Processes Using IoT
"GSM network and its privacy - the A5 stream cipher" by Thomas Stockinger
"COMP128: A Birthday Surprise" by Stuart Wray
"Solutions to the GSM Security Weaknesses" by Mohsen Toorani and Ali A. Beheshti
"Weaknesses in WEP and WPA" by Martin Guest and Antoine Lefebvre
"Comparative Analysis of Wireless Security Protocols: WEP vs WPA" by Arif Sari and Mehmet Karay
"Bluetooth Security" by Antnan Giousouf and Kerstin Lemke
"Security protocols in Bluetooth Standard" by Sijan Shrestha, Cheikhoul Seck and Were Oyomno
"Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing Attack" by Payal Chaudhari and Hiteishi Diwanji
Case Studies on IoT applications in Agriculture, Vehicular, Healthcare, and Future Generations, etc.
Hands-on practical implementation of IoT environments using Arduino and Raspberry PI.
Approx. Number of Classes – 10
Textbooks
"Introduction to IoT" by S. Mishra, A. Mukherjee and A. Roy (Cambridge University Press)
Chapter 12 Agricultural IoT
Chapter 13 Vehicular IoT
Chapter 14 Healthcare IoT
Chapter 15 Paradigms, Challenges, and the Future
Chapter 16 Beginning IoT Hardware Projects
References
"Internet of Things: Architecture and Design Principles" by Raj Kamal (McGraw Hill Education)
Chapter 12 IoT Case Studies