CIS4019-N IoT Security Assignment

Assignment Help Computer Engineering
Reference no: EM132718648

CIS4019-N IoT Security - Teesside University

IoT - Luggage Tracker

"Element one will involve a IOT application design proposal for a specific scenario and will assess learning outcomes 1,2,3,5 and 6. Students will be assessed via a written report around 2000 words on

Their ability to communicate clearly and professionally regarding technical issues in an IoT network and security.

• Use of evidence-based decisions when selecting technologies and software to provide communication with low-level firmware on embedded devices.
• Demonstrating a comprehensive knowledge of the key concepts of IoT and its enabling technologies.
• Developing software to facilitate higher-level data processing of data obtained from IoT devices, evaluating how well it meets specified requirements.
• Designing and building (or simulate) a sensor network based on Internet of Things technology, considering potential professional and ethical issues associated with the network's operation.

Your Task
You will work in groups (3-4 persons) and write a report of around 2000 words describing design and simulation of new system. It will include two parts
Part 1:
a. Overall Architecture and Design of the system
b. Details of the design of the IOT system and justification of selected technologies and software to provide communication: including
• The HW platform/ Processor (s) • The operating system and drivers
• The sensors and actuators.
• The physical channel?-?BLE/Zigbee etc (Remember short range/ not to interfere with other)
• The logical channel?-?What protocols the SW uses to transport these messages (HTTP / MQTT etc)
• Network/connectivity topology
• Maintenance
• Data Storage
• Data Access
• Cost
Part 2:
c. Your report must also include details of simulation of the given scenario to demonstration communication using appropriate simulation tool. You can include screenshots/results/ code etc. Requirement of the simulation are
i A static network of 50+ nodes with one or two base station nodes ii Tracking of a moving node (luggage)
iii Transmission of approximate Current location (of moving node) to base station at periodic intervals
d. Reflection on potential professional and ethical issues associated with the proposed system.

Attachment:- IoT Security.rar

Reference no: EM132718648

Questions Cloud

How do we use epistemology to teach machines : How do we use epistemology to teach machines? Course: Business
Apply morality and ethics : Your father was diagnosed with a lung cancer. The whole family was told by the physician that he has only six months to live.
Apply the lessons of morality and ethics : She confided to you about this matter and ask your opinion whether to have an abortion or not. What will be your advice to your best friend?
Objecting the brain identity theory : Present and explain a philosophical theory objecting the Brain Identity Theory.
CIS4019-N IoT Security Assignment : CIS4019-N IoT Security Assignment Help and Solution, Teesside University - Assessment Writing Service IoT - Luggage Tracker
Difference between objective and subjective truth : According to Kierkegaard, what is the difference between objective and subjective truth?
Find how calculate the beta of the entire portfolio : Find How calculate the beta of the entire portfolio. Without adding new assets, how would you adjust the portfolio to make it more aggressive?
What is the logical fallacy or fallacies : Let us also not forget that Stalin and Hitler also tried to take away people's guns. These are two of history's most evil figures. This should leave no doubt
What price would expect to be able to sell : Suppose instead you plan to hold the stock for one year. What price would you expect to be able to sell a share of Acap stock for in one year?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss the various risk mitigation controls

Discuss the various risk mitigation controls and highlight when to use each of them. You are to highlight and discuss the various types of risk mitigation.

  Discuss an important aspect of information technology

This week we discuss an important aspect of information technology: ethics. Please describe the term information system ethics and note some of the principles.

  Write a program with a graphical interface

Write a program with a graphical interface that allows the user to convert an amount of money between U.S. dollars (USD), Euros (EUR), and British pounds (GBP).

  When might an organization opt for an Agile SDLC

Agile systems development provides organizations with an iterative model, allowing for quicker, more incremental results. However, an Agile SDLC is also more.

  Prompt the user to enter the data to populate the structure

The program should then prompt the user to enter the data to populate the structure. Finally, use printf( ) to display the information entered by the user.

  As a member of the information security team at a small

as a member of the information security team at a small college you have been made the project manager to install an

  Continuenbspworking on your proposaldevelopnbspthe flow

continuenbspworking on your proposal.developnbspthe flow diagram of the information and any control elements needed to

  Suppose that the toolbar is named tbrcurrent

at last if the index of the button is two (2), then call the procedure named ExitSolution. Assume that the toolbar is named tbrCurrent.

  Demonstrate the concepts of phase and group velocities

Two copropagating plane waves that have the same magnitude but a small frequency difference.

  Write xhtml to create a table with three rows and two column

Use CSS to configure a table that has a border around both entire table and the table cells. Write the XHTML to create a table with three rows and two columns.

  How is your organization structured

Examine your own organization, or the organization of your choice. How is your organization structured (push or pull)? Justify your response.

  Discuss the specific role that protestant reformation played

Discuss the specific role that the Protestant Reformation played in laying the groundwork for the advancement of communication techniques.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd