Reference no: EM133676358 , Length: 1800 words
Internet of Things Security
Assessment type: Group project
Learning Outcome 1: Analyse security and privacy challenges and the requirements of IoT applications
Learning Outcome 2: Identify and categorise security vulnerabilities and attacks in an IoT environment
Learning Outcome 3: Apply security techniques and technologies to secure IoT applications according to enterprise requirements
Learning Outcome 4: Design and develop an IoT application in a simulated environment, identify its security issues, and propose solutions
Purpose: Design and develop an loT application in a simulated environment, analyse security and privacy challenges/issues for loT applications, and propose solutions. The assessment is an assessment of the combination of research, design, and implementation of loT application security. This assessment contributes to learning outcomes a, b, c and d.
Task Details: The tutor will form the group with 3-4 students. Groups are required to research about loT applications and write down the literature review summary of those applications. The literature must be either journal articles or conference papers. Groups will choose an loT application to develop for their project. The requirements of the chosen loT application must be approved by the tutor in week 3. Group will also analyse security and privacy issues related to the proposed application using the modelling techniques learned in the subject. Furthermore, the groups are required to suggest counter solutions for secure the application
The project report must be more than 3000 words and must use the provided group report template. The group report template is provided in the Moodie.
The individual report must include four main parts:
1. Class demonstration and presentation
2. Activity/meeting log
3. Contribution description
4. Individual reflection journal: reflections on the team collaborations, problems, solutions and lesion learnt
The project report must include at least the following sections:
• Table of Content: An autografted ToC should be included with heading and subheadings
• Executive Summary: an executive summary highlights the design, analysis, and conclusions
• Introduction: introduction of the loT application and its requirements
• Literature review summary of loT applications
• Design and development: complete design of the application based on the requirements with detailed system and application architecture. The development is carried out in Cooja. The details of the implementations and the results are discussed
• Security Issues: analyse and discuss all related security concerns of the loT application using threads modelling techniques
• Security solutions: propose and justify solutions for the security issues
• Conclusion: provide a summary and recommendations
• Reference
• Appendix individual contributions