CIS4019-N IoT Security Assignment

Assignment Help Computer Engineering
Reference no: EM132718648

CIS4019-N IoT Security - Teesside University

IoT - Luggage Tracker

"Element one will involve a IOT application design proposal for a specific scenario and will assess learning outcomes 1,2,3,5 and 6. Students will be assessed via a written report around 2000 words on

Their ability to communicate clearly and professionally regarding technical issues in an IoT network and security.

• Use of evidence-based decisions when selecting technologies and software to provide communication with low-level firmware on embedded devices.
• Demonstrating a comprehensive knowledge of the key concepts of IoT and its enabling technologies.
• Developing software to facilitate higher-level data processing of data obtained from IoT devices, evaluating how well it meets specified requirements.
• Designing and building (or simulate) a sensor network based on Internet of Things technology, considering potential professional and ethical issues associated with the network's operation.

Your Task
You will work in groups (3-4 persons) and write a report of around 2000 words describing design and simulation of new system. It will include two parts
Part 1:
a. Overall Architecture and Design of the system
b. Details of the design of the IOT system and justification of selected technologies and software to provide communication: including
• The HW platform/ Processor (s) • The operating system and drivers
• The sensors and actuators.
• The physical channel?-?BLE/Zigbee etc (Remember short range/ not to interfere with other)
• The logical channel?-?What protocols the SW uses to transport these messages (HTTP / MQTT etc)
• Network/connectivity topology
• Maintenance
• Data Storage
• Data Access
• Cost
Part 2:
c. Your report must also include details of simulation of the given scenario to demonstration communication using appropriate simulation tool. You can include screenshots/results/ code etc. Requirement of the simulation are
i A static network of 50+ nodes with one or two base station nodes ii Tracking of a moving node (luggage)
iii Transmission of approximate Current location (of moving node) to base station at periodic intervals
d. Reflection on potential professional and ethical issues associated with the proposed system.

Attachment:- IoT Security.rar

Reference no: EM132718648

Questions Cloud

How do we use epistemology to teach machines : How do we use epistemology to teach machines? Course: Business
Apply morality and ethics : Your father was diagnosed with a lung cancer. The whole family was told by the physician that he has only six months to live.
Apply the lessons of morality and ethics : She confided to you about this matter and ask your opinion whether to have an abortion or not. What will be your advice to your best friend?
Objecting the brain identity theory : Present and explain a philosophical theory objecting the Brain Identity Theory.
CIS4019-N IoT Security Assignment : CIS4019-N IoT Security Assignment Help and Solution, Teesside University - Assessment Writing Service IoT - Luggage Tracker
Difference between objective and subjective truth : According to Kierkegaard, what is the difference between objective and subjective truth?
Find how calculate the beta of the entire portfolio : Find How calculate the beta of the entire portfolio. Without adding new assets, how would you adjust the portfolio to make it more aggressive?
What is the logical fallacy or fallacies : Let us also not forget that Stalin and Hitler also tried to take away people's guns. These are two of history's most evil figures. This should leave no doubt
What price would expect to be able to sell : Suppose instead you plan to hold the stock for one year. What price would you expect to be able to sell a share of Acap stock for in one year?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd