Current or future security issues in internet of things

Assignment Help Computer Networking
Reference no: EM131657184

Purpose of the assessment -

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

Identify and report network threats, select and implement appropriate countermeasures for network security

Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description - The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work.

Verified Expert

The task is a literature review on security challenges related to emerging networks. As the Internet of Things or IoT is an emerging technology so IoT and its security challenges have been discussed in the paper.

Reference no: EM131657184

Questions Cloud

Did r-and-j have a valid conversion claim : R&J did not submit this list and did not contact T&C again about the personal propertyitems. Later, R&J sued T&C for conversion of the personal property.
Trial court correct in granting cingular motion to dismiss : After the trial court granted Cingular's motion, Williams appealed to the Indiana Court of Appeals. Was the trial court correct in granting Cingular's motion.
What are the various responses to a competitors price change : What are the various responses to a competitor's price change? What are intermediaries and why are they important?
Carl jung theory of personality type : Searches related to disagree or agree with Based on Carl Jung's theory of personality type.
Current or future security issues in internet of things : MN502 - Overview of Network Security - Security Challenges in Emerging Networks - Analyse critically,three current or future security issues in IoT
Were the defendants correct in arguing : Gaile Nixon, R.M.V.'s mother, filed a negligence suit against Chalmette's owner and Mr. Property Management Company, Inc., the manager of the complex.
Amount of charitable services to the public : Although both for-profit and not-for-profit hospitals provide a certain amount of charitable services to the public
Why is the modern distribution center : Why is the modern Distribution Center such a challenging environment? Do you foresee the environment getting better or worse in the future?
Why do you believe a needs assessment is necessary : Post a description of the issue you selected. Explain how a needs assessment would benefit this issue and contribute to social change.

Reviews

inf1657184

12/28/2017 4:32:12 AM

Hi Thanks for the assignment. I got an awesome task help, and it was justified regardless of the value i spent on my task offer assistance. My all 3 friends are also happy with the work you provided.

inf1657184

11/2/2017 6:30:01 AM

Thanks, I will pay today evening but please try to make assignment before Thursday evening. I have paid for the assignment. Please start work on it and make sure there should not any plagiarism. How much time will you take more to complete this assignment? Sorry for asking this question. Actually, I have to prepare for the presentation before submitting the assignment. Please try to complete asap. Kindly do not feel sorry, it's your rights to ask. we will try best to deliver it today only.

len1657184

9/25/2017 5:24:48 AM

Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len1657184

9/25/2017 5:24:41 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout

len1657184

9/25/2017 5:24:34 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1657184

9/25/2017 5:24:26 AM

Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6 Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1657184

9/25/2017 5:24:16 AM

• All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. • If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment.

Write a Review

Computer Networking Questions & Answers

  Discuss the pros and cons

Per the text, with Server 2012, the option for policy based IP address assignment is available. Discuss the pros and cons of using policy based assignments to segregate mobile devices from the other machines on the network

  Detail study on social media

The length of your report should reflect the complexity of the topic and the thoroughness of the research. The report should be self-contained (explain any terminology particular to the topic the first time you use it), consistent, and to the poin..

  Probability of collision in computer network

In CSMA/CD, after the 6th collision, what is the probability that a node chooses k=7? The result k=7 corresponds to a delay of how many seconds on a 10 Mbps Ethernet?

  Display the column names from the loan data set

Randomly shuffle the loan data set. Run 10-fold cross-validation to evaluate the out-of-sample performance of Random Forest, ANN and SVM. Based on your cross-validation results, which model has the best out-of-sample performance? Please briefly ex..

  How traffic will flow across connectivity between lans based

how traffic will flow across the connectivity between LANs based

  Type of network provides limited access to corporate data

Which type of network provides customers with limited access to corporate data such as inventory, parts lists, and orders?

  How to evaluate a hash

We have been handed a file that contains a bunch of encoded text or hashed passwords and we need get these back into a readable plain text format. Some answers are text strings and others are the passwords that we will need to complete our investi..

  Describe the network management software components side

describe the network management software components. side server components middleware components and northbound

  Value of server farms-virtualization to large organization

Describe at lease 750 words(in your own words) what is meant by "server farm" and by "virtualization". What is the value of server farms and virtualization to large organization?

  In logicworks

In Logicworks, make a new design for an automobile third brake light. It will have 8 clock pulses (so use 3 D Flip Flops) and will sequence an LED stip of 15 red LED's as shown after each clock pulse. On the 7th clock pulse, the clock will become ..

  Risk incidence occurrence solution

Identify and select an incident in which you are interested. An example of an incident could be that which is acquired or occurred during hospital stays.

  How to perform recursive queries of other dns servers

You are expected to turn in a network diagram. and access control lists for both incoming and outgoing traffic for the appropriate interface.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd