Designing an appropriate iot application

Assignment Help Computer Network Security
Reference no: EM132724020 , Length: word count:2000

CIS4019-N IoT Security - Teesside University

Their ability to communicate clearly and professionally regarding technical issues in an IoT network and security.
• Use of evidence-based decisions when selecting technologies and software to provide communication with low-level firmware on embedded devices.
• Demonstrating a comprehensive knowledge of the key concepts of IoT and its enabling technologies.
• Developing software to facilitate higher-level data processing of data obtained from IoT devices, evaluating how well it meets specified requirements.
• Designing and building (or simulate) a sensor network based on Internet of Things technology, considering potential professional and ethical issues associated with the network's operation.

The Scenario

An airport management organisation is responsible for handling baggage of the passengers. Currently, there are many problems with baggage systems and complaints for baggage lost are increasing. The company wants to track the baggage in the airport from unloading until passenger receives it.
They decided to deploy IoT sensors with short-range communication in the airport, which can detect any baggage. The information about last reported location of baggage is sent to base station, which is connected to Internet. This information should be accessible to staff.

Your Task

You will work in groups (3-4 persons) and write a report of around 2000 words describing design and simulation of new system. It will include two parts

Part 1:
a. Overall Architecture and Design of the system
b. Details of the design of the IOT system and justification of selected technologies and software to provide communication: including
• The HW platform/ Processor (s) • The operating system and drivers
• The sensors and actuators.
• The physical channel?-?BLE/Zigbee etc (Remember short range/ not to interfere with other)
• The logical channel?-?What protocols the SW uses to transport these messages (HTTP / MQTT etc)
• Network/connectivity topology
• Maintenance
• Data Storage
• Data Access
• Cost

Part 2:
c. Your report must also include details of simulation of the given scenario to demonstration communication using appropriate simulation tool. You can include screenshots/results/ code etc. Requirement of the simulation are
i A static network of 50+ nodes with one or two base station nodes
ii Tracking of a moving node (luggage)
iii Transmission of approximate Current location (of moving node) to base station at periodic intervals
d. Reflection on potential professional and ethical issues associated with the proposed system.

• [Design] (LO 2,3) Designing an appropriate IoT application with understanding of key concepts of IoT systems and selection of appropriate technologies of IoT systems covering aspects defined in Task 1 ;

• [Implement] (LO 5,6) Demonstrating an working model of IoT systems through simulation and identifying professional and ethical issues associated with the given scenario, coverings aspects defined in Task 2 ;

• [Write] (LO 1) Demonstrating report writing and research capabilities.

Attachment:- IoT Security.rar

Reference no: EM132724020

Questions Cloud

What happens at the level of the plant physiology : When a deer eats a plant it prefers to eat the fresh shoot tips of the plant. Describe what happens at the level of the plant's physiology, biochemistry
Interpret the evolutionary events : Interpret the evolutionary events that led to the vast diversity shown in the fossil record due to the Cambrian explosion. Be detailed.
Mechanisms of o2 transport in the human body : Relate these behaviors to the mechanisms of O2 transport in the human body and to the physiological interactions to our gaseous environment. Be detailed.
Difference between fat and carbohydrate absorption : What is the main difference between fat and carbohydrate absorption?
Designing an appropriate iot application : Designing an appropriate IoT application with understanding of key concepts of IoT systems and selection of appropriate technologies of IoT systems
Describe the structures of the endocrine system : Describe the structures of the skin. Describe the structures of the endocrine system.
Physical principle of heat transfer : Which physical principle of heat transfer explains why a bird's feathers lift away from the body slightly when temp drops?
Describe the musculoskeletal system : Describe the musculoskeletal system how one might concluded the reason for Lupus?
Assess asexual reproduction and sexual reproduction : What is the difference between asexual reproduction and sexual reproduction?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Specification of a software design

List the four design models required for a complete specification of a software design and the role of each.

  Examine how system balanced security and usability

Analyzes the implementation of the system in your plan. Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

  Do you agree that billie should try to better coordinate

Billie Morris is the BI Director at Love You, a large manufacturer and distributor of upscale cosmetics products for women.

  How many keys are possible in such a cipher

Consider a transposition cipher that uses a five by five matrix and permutes the columns before reading them out.- How many keys are possible in such a cipher?

  Security measures currently in place give adequate security

Explain in scholarly detail on whether you believe security measures currently in place give adequate security as well as privacy, or do you believe these issues being emphasized are at the expense of the other?

  Design such a password protocol and evaluate its usability

An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother's maiden name, a password, and the amount of your last purchase, but also your dog's nickname a..

  Ssl for http traffic

SSL Record protocol of the SSL protocol stack, RADIUS, networks for access control, DNS poisoning, Spear Phishing attacks, centralised or decentralised access control, encrypt email data

  Why do servers require configuration and logging

What would be the first argument of csc_abc_prepare() and what would be the first argument of csc_abc_dolt() - Why do servers require configuration and logging?

  Draw a concept map or annotated attack tree

Draw a concept map or annotated attack tree which represents the context of John Kleen Communication & Media Ltd's work environment and also demonstrates.

  Create website security plan that will keep the information

The CIO of the online grocery store has asked you to create a website security plan that will keep the information that they are entrusted with safe, secure and out of the news.

  Create and describe a diagram of the network architecture

Create and describe a diagram of the network architecture, discussing how it can meet the goals of the company.

  Develop a technology proposal - windows network proposal

Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd