Write literature review on internet of things

Assignment Help Other Engineering
Reference no: EM131666237

Security Challenges in Emerging Networks

Purpose of the assessment

The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:
- Identify and report network threats, select and implement appropriate countermeasures for network security
- Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization
- Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

The assignment should be written in IEEE conference format:

This assignment includes four parts
1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

Make an PPT only

Reference no: EM131666237

Questions Cloud

Discuss why the american legal system is unique : Many countries do not conduct a trial when addressing legal issues; as such, the American legal system is unique in this respect
How is the use of learning theory in the design of amexs : How has the American Express Learning Network utilized learning theory, goal setting, and reward systems in addressing the challenge of its own staff members.
Formulate practical capacity of the three departments : How much of the total annual building cost of $2,000,000 will be allocated in 2018 to each of the departments, if the cost is allocated to each department.
What are some examples of when venue or jurisdiction : What are some examples of when venue, or jurisdiction, may become an issue in a criminal case
Write literature review on internet of things : MN502 - Overview of Network Security - Security Challenges in Emerging Networks
Sand inc issued bonds at face value : Several years ago, castles in the sand inc issued bonds at face value of $1000 at a yield to maturity of 6.6%. Now with 8 year left until the maturity.
Discuss the supreme courts guidelines : Many people feel that once an individual is placed under arrest that law enforcement is required to advise that individual of their Miranda rights
Benefits function of human resource management : List key legislation affecting the benefits function of human resource management.
What are the costs allocated to the dark chocolate division : Using the dual-rate method, what are the costs allocated to the dark chocolate division and the milk chocolate division when variable costs are allocated.

Reviews

len1666237

10/2/2017 7:07:57 AM

Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len1666237

10/2/2017 7:07:52 AM

Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len1666237

10/2/2017 7:07:44 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities

len1666237

10/2/2017 7:07:38 AM

Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6 Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

len1666237

10/2/2017 7:07:29 AM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. • If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7.

Write a Review

Other Engineering Questions & Answers

  Build the circuit on your prototyping breadboard

ELE1502 Electronic Circuits Assignment. You need to build the circuit on your prototyping breadboard and take some measurements with a multimeter (DMM)

  Draw a circuit diagram to provide rotary actuation

Modify the design of the circuit shown in FIGURE 3 and draw a circuit diagram to provide rotary actuation in both directions using a single direction pump (to replace the bi-directional pump) and providing a means of preventing over-speeding in th..

  Preparing a cash budget

Analyze the steps involved in preparing a cash budget and determine which steps presents the greatest number of obstacles to the greatest number of small businesses

  Customer satisfaction and dissatisfaction, complaints issues

A discrete random variable has a mean of 400 and a variance of 64. What is the standard deviation?

  What are the fractions of octahedral and tetrahedral holes

Draw the Fe (FCC) and Fe (BCC) unit cells to show the arrangement of atoms and the interstitial sites (both octahedral and tetrahedral sites)

  The media example of an extraneous variable

Is it a positive or negative correlation? How did you determine this to be the case?

  What are the values for Z and N flag after executing

What are the values for Z and N flag after executing CMP r1, r0 and What are the values for Z and N flag after executing TEQ r1, r0

  The machine will consist of a base or frame

The machine will consist of a base or frame, a rotary actuator (to obtain the 90 degree desired rotation about the x-axis), a linear actuator that will move plates back and forth to obtain the 180 degree axis rotation about the y-axis, and a PLC/HMI ..

  Determine the porosity of the soil

When sub merged in the oil the saturated sample displaces 137,100 nun3 of oil. Determine the porosity of the soil.

  Determine the prefault internal voltage magnitude

Using the classical generator model, determine the prefault internal voltage magnitude and angle of the generator -  Express the system dynamics during the fault as a set of first order differential equations.

  Prepare a optical networks1- background about optical

prepare a optical networks1- background about optical network and how it is work.2- advantages and application for

  Explain the given regular laminate and balanced laminate

Define and explain the given Regular laminate, Balanced laminate, and Specially orthotropic laminate.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd