Literature review on internet of things

Assignment Help Computer Networking
Reference no: EM131643269

Assessment - Security Challenges in Emerging Networks

Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

Identify and report network threats, select and implement appropriate countermeasures for network security

Use security policies to manage operational security, and then administer those policies to ensure compliance by users in an organization

Demonstrate professional and ethical behaviour with regard to network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

Internet of Things (IoT) is an emerging area in computer networking. Internet of Things could refer to a network of devices with embedded technology including Sensors, Radio Frequency Identification tags, actuators, with the ability to continuously sense and exchange data to perform a range of tasks.The IoT will have a major impact on aspects of everyday-lives and behaviour of users. Security of Internet of Things is a prime concern.

This assignment includes four parts

1. Literature review on Internet of Things (IoT)

You need to write 800 word literature on IoT. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

2. Analyse critically,three current or future security issues in IoT.

In this section you will analyse critically, three security issues in Internet of Things. These issues could be taken from the current state of the art or could be evolved from your own independent innovative thinking. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section(2).

In this part you need to apply knowledge to the existing knowledge domain of IoT. You need to choose one of the issues identified in the previous section and propose a possible solution to this particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Submission Guidelines

The assignment should be submitted on the Moodle in two separate files:

1. The report should be submitted as a Word file
2. The presentation should be submitted as a PPT file

Verified Expert

The work is in 1800 words in IEEE format in MS word and PPT where the focus is on handling the IoT and handle the measures which includes the different issues related to the working of the system, security and the privacy measures. this IoT also works with the enhancement of the system level and the practices.

Reference no: EM131643269

Questions Cloud

Construct a bar graph showing the number of students : The students in Ms. Ramirez's math class have birthdays in each of the four seasons. Table shows the four seasons, the number of students who have birthdays.
Contact your interviewee and set up a time : Contact your interviewee and set up a time to do the interview. The interview can be done face-to-face, over the phone, or via email.
What qualifications you have or may need to get the position : Why you are interested in the career, what qualifications you have or may need to get this position, and where do you see yourself in this career long-term.
Define online learning strategies : Completing courses in the absence of a physical classroom and frequent face-to-face contact can be challenging
Literature review on internet of things : Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art - current or future
Calculate the dollar amount of direct materials : ZZ, Inc. has budgeted sales for the next five months as follows: Calculate the dollar amount of direct materials to be purchased in January
Nurses as leaders in health care reform : Nurses as Leaders in Health Care Reform, the United States continues to evolve, either through mandates
What types of information are include in statistical section : Does the report include "combining statements?" If so what is the nature of these statements? What types of information are included in the statistical section?
Describes the 8 core functions of an ehr : Describes the 8 core functions of an EHR. Please select one of the functions and describe what it does.

Reviews

inf1643269

11/21/2017 5:13:39 AM

I found the assignment is best and plagiarism free. Service is very quick and excellent. Thanks for help. Up to mark good grammar good use of ideas will recommend everyone great knowledge.

inf1643269

11/21/2017 5:13:20 AM

plz make some discount. should be fine.This assignmnt also contain ppt 6 -7 slides hope you also cover this. So how much you want wid ppt. Oke done . Send me payment option links The assignment should be written in IEEE conference format: https://www.ieee.org/publications_standards/publications/conferences/2014_04_msw_a4_format.doc Check this .formag of assignmnet is lyk this . Given in the report Its oke but make its apperence as show in link lyk a book two side . 25051042_11506052791809982663683.jpg

len1643269

9/15/2017 3:53:38 AM

Last tym i prepraed same typ assignmnet bt it comes 11 % plagrium so plz take this tym do every step in netsim and provide my last name sekhon as given confiuration and student id . Analyse the troubleshoot steps breifly . Plz make assignment good so i can score good marks in this 1

len1643269

9/15/2017 3:39:23 AM

Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /4 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /4 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len1643269

9/15/2017 3:39:16 AM

Analyse Critically /6 Exceptional discussion on security vulnerabilities for the system. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security vulnerabilities for the system. Discussion on three security vulnerabilities Discussion on Two security vulnerabilities Unable to identify security vulnerabilities Propose a possible solution /6 Advance discussion on threats mitigation using latest technologies and procedures Good discussion on threats mitigation using technologies and procedures Good discussion on threats and mitigation Discussion on threats and mitigation Lacking discussion on threats and mitigation Report Layout /5 Well designed layout and proper formatting in IEEE Conference Style Well designed layout in IEEE Conference style Layout in IEEE Conference style Report layout and formatted but not in IEEE Conference style Report lacks a proper layout

len1643269

9/15/2017 3:39:09 AM

Marking Rubric for Assignment #2: Total Marks 50 Grade Mark HD 40-50 DI 35-39 CR 30-34 P 25-29 Fail <25 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Literature Review /15 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len1643269

9/15/2017 3:39:02 AM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Internet of Things 5 Literature Review Literature review of Internet of Things 15 Analyse critically Analyse critically, three security vulnerabilities of Internet of Things. 6 Propose a possible solution Discuss a threat mitigation technique for one of the security vulnerability 6 Report Layout The report should be written in IEEE conference format 5 Reference style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 4 Oral Presentation Delivery of the presentation 4 Total 50

Write a Review

Computer Networking Questions & Answers

  Identify three styles of switching from user mode

Describe the advantages of using a MMU (memory management unit) that incorporates segmentation and paging over ones that either use pure paging or pure segmentation.

  What cli command does produce the output below

What CLI command does produce the output below. Complete the table below based on the dynamic routes displayed in the routing table above.

  Osi model-switching systems-network channel processors

In packet switching, the output links to which a packet should be forwarded is not known before their arrivals. Unlike in time-division multiplexing, there is no telling exactly how many packets from an input will be destined for each output over ..

  Evaluate the set of detectors generated by noise

Apply the aiNet algorithm to the data set presented (Exercise). Make use of the MST edge inconsistency criterion in order to separate the network clusters.

  How many bits can be represented with each signal change

A carrier wave is modulated with 4 amplitudes and 4 phase changes; how many bits can be represented with each signal change? The ______ layer contains the logic needed to support the various user applications.

  Answer the following questions1 a company develops a new

answer the following questions.1 a company develops a new security product using the extreme programming software

  Display the column names from the loan data set

Randomly shuffle the loan data set. Run 10-fold cross-validation to evaluate the out-of-sample performance of Random Forest, ANN and SVM. Based on your cross-validation results, which model has the best out-of-sample performance? Please briefly ex..

  Install backbone to connect four base-t ethernet lans

You have been hired by a small company to install backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub) and to give a connection to Internet. Develop simple backbone and determine total cost.

  Explain how the components are related to each other

Describe the function and purpose of each component above. Explain how the components are related to each other. For example, does the component depend on another to operate? Is it connected to the network physically or wirelessly

  Sketch network diagram to insert it in word document

Write and draw network diagram which will be inserted into the Word document to be presented to the manager - who has technical background - that details your plan.

  Shannon hartley theorem

In this assignment, you are to write a paper (3-4 pages) on the how the Shannon-Hartley theorem impacts the bandwidth channel's capacity. It is important for you to include in your paper how the Nyquist rate and Gaussian noise impact the capacity ..

  What role leadership knowledge and skills play

What role leadership knowledge and skills play - design and integrate value-added leadership learning modules into your organization''s training efforts.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd