Reference no: EM132719820 , Length: word count:2000
A layer-wise component and security analysis of an IoT application
IOT Security
Analysis of an IoT application in layered view, and security analysis of that application and making a report of process (approx. 2000 words). This element will assess the learning outcomes 1, 4 and 7, which are as below:
1. Communicate clearly and professionally regarding technical issues in an IoT network and security.
4. Demonstrate critical understanding of standard security and privacy preserving mechanisms in IoT.
7. Discuss and make informed comments on emerging areas of the Internet of Things, demonstrating an understanding of the social, environmental and commercial context.
The Scenario
CyberHealth Ltd. is a Teesside based cybersecurity solution provider, where you are working as a cybersecurity expert. Your company provides Networking & Cybersecurity solutions for the business environment. They currently offer managed, professional, and hardware & software services. Recently, few companies have approached CyberHealth to offer them services for their IoT solution clients. CyberHealth is interested in extending its business by providing services to its customers who offer IoT solutions.
The use of telemedicine with the support IoT has increased globally due to COVID-19. Your company is more interested in healthcare-related IoT solution providers or customers. In this context, you are assigned to analyse the security of an existing remote monitoring system (offered by an IoT solution provider) for elderly and chronic disease patients.
Your Tasks
Task 1: Discuss the three- and five-layered architecture of the IoT-based remote patient monitoring system (e.g., fall detection and reporting or any app selected from Google's play or Apple' Apps store)
• A diagram of the architecture
• Brief description of each layer (e.g., sensing or perception) with their components (e.g., specific sensor or sensors).
Task 2: Select one of the two IoT architectures mentioned above and justify your selection, especially from the perspective of cyber security.
Task 3 Explain with examples how you would analyse the E2E security concerns (using the selected architecture in task 2 and its layer-wise components) of the selected solution (40% mark). For this task, be precise about tools and methods. Justify all your decisions.
Task 4 Discuss countermeasures for the identified security concerns of the sensing (in task 3) layer of the selected patient monitoring system.
Task 5 Discuss and make informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context.
Task 6 Write the report clearly and professionally (i.e., using reference) regarding technical issues in an IoT network and security.
Attachment:- IoT application.rar