Designing an appropriate iot application

Assignment Help Computer Network Security
Reference no: EM132724020 , Length: word count:2000

CIS4019-N IoT Security - Teesside University

Their ability to communicate clearly and professionally regarding technical issues in an IoT network and security.
• Use of evidence-based decisions when selecting technologies and software to provide communication with low-level firmware on embedded devices.
• Demonstrating a comprehensive knowledge of the key concepts of IoT and its enabling technologies.
• Developing software to facilitate higher-level data processing of data obtained from IoT devices, evaluating how well it meets specified requirements.
• Designing and building (or simulate) a sensor network based on Internet of Things technology, considering potential professional and ethical issues associated with the network's operation.

The Scenario

An airport management organisation is responsible for handling baggage of the passengers. Currently, there are many problems with baggage systems and complaints for baggage lost are increasing. The company wants to track the baggage in the airport from unloading until passenger receives it.
They decided to deploy IoT sensors with short-range communication in the airport, which can detect any baggage. The information about last reported location of baggage is sent to base station, which is connected to Internet. This information should be accessible to staff.

Your Task

You will work in groups (3-4 persons) and write a report of around 2000 words describing design and simulation of new system. It will include two parts

Part 1:
a. Overall Architecture and Design of the system
b. Details of the design of the IOT system and justification of selected technologies and software to provide communication: including
• The HW platform/ Processor (s) • The operating system and drivers
• The sensors and actuators.
• The physical channel?-?BLE/Zigbee etc (Remember short range/ not to interfere with other)
• The logical channel?-?What protocols the SW uses to transport these messages (HTTP / MQTT etc)
• Network/connectivity topology
• Maintenance
• Data Storage
• Data Access
• Cost

Part 2:
c. Your report must also include details of simulation of the given scenario to demonstration communication using appropriate simulation tool. You can include screenshots/results/ code etc. Requirement of the simulation are
i A static network of 50+ nodes with one or two base station nodes
ii Tracking of a moving node (luggage)
iii Transmission of approximate Current location (of moving node) to base station at periodic intervals
d. Reflection on potential professional and ethical issues associated with the proposed system.

• [Design] (LO 2,3) Designing an appropriate IoT application with understanding of key concepts of IoT systems and selection of appropriate technologies of IoT systems covering aspects defined in Task 1 ;

• [Implement] (LO 5,6) Demonstrating an working model of IoT systems through simulation and identifying professional and ethical issues associated with the given scenario, coverings aspects defined in Task 2 ;

• [Write] (LO 1) Demonstrating report writing and research capabilities.

Attachment:- IoT Security.rar

Reference no: EM132724020

Questions Cloud

What happens at the level of the plant physiology : When a deer eats a plant it prefers to eat the fresh shoot tips of the plant. Describe what happens at the level of the plant's physiology, biochemistry
Interpret the evolutionary events : Interpret the evolutionary events that led to the vast diversity shown in the fossil record due to the Cambrian explosion. Be detailed.
Mechanisms of o2 transport in the human body : Relate these behaviors to the mechanisms of O2 transport in the human body and to the physiological interactions to our gaseous environment. Be detailed.
Difference between fat and carbohydrate absorption : What is the main difference between fat and carbohydrate absorption?
Designing an appropriate iot application : Designing an appropriate IoT application with understanding of key concepts of IoT systems and selection of appropriate technologies of IoT systems
Describe the structures of the endocrine system : Describe the structures of the skin. Describe the structures of the endocrine system.
Physical principle of heat transfer : Which physical principle of heat transfer explains why a bird's feathers lift away from the body slightly when temp drops?
Describe the musculoskeletal system : Describe the musculoskeletal system how one might concluded the reason for Lupus?
Assess asexual reproduction and sexual reproduction : What is the difference between asexual reproduction and sexual reproduction?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd