ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Internet of Things: Privacy and Security

Verified

Added on  2020/02/24

|9
|1889
|288
AI Summary
This assignment focuses on key aspects of the Internet of Things (IoT), particularly concerning privacy and security. It examines how data creation through interconnected objects raises concerns about individual exposure and the need for robust protection mechanisms. The discussion also touches upon interoperability issues, the impact of Nielsen's Law, and the implications of Moore's Law on IoT development. The assignment encourages critical thinking about the design considerations necessary to address these challenges in a rapidly evolving technological landscape.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
IoT

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Document Page
Contents
Answer 1:.........................................................................................................................................1
Answer 2:.........................................................................................................................................2
Answer 3:.........................................................................................................................................2
Answer 4:.........................................................................................................................................4
Answer 5:.........................................................................................................................................5
Answer 6:.........................................................................................................................................5
References........................................................................................................................................7
Document Page
Answer 1:
The user interface is for the designing of the fields with the Human Computer Interaction
between the machines and the humans. The major goal is to allow all the effective operations and
then control of the machine as well. This includes the feedback of the information which
includes the working with the different aspects of creating the user interface with the
involvement of the self-explanatory and the sufficient patterns for operating the machine. This
includes the minimal input with the desired output which could minimize the undesired types of
the output to the human. (Frost, 2015). With this, there is also a proper and an increased use of
the computers which includes the management of the graphical user interface. The terms like the
man machine learning is set with the computer interaction that corresponds to the usability
engineering. The no user interface works on the computer systems and the computer graphics
that is to highlight on the graphical user interface. There is different screen based thinking which
are best for the applications. The screen based thinking leads to why no user interface is
considered to be best. Some of the applications for the same are:
a. The new technology for the motor engine is need which is able to properly design the
steering wheel which results in the better products of the car, to reach towards it best
potential.
b. How the person is able to go to his car, where there are intermediate steps like the
walking towards the car, unlocking the phone, checking the messages and then locking it
and sitting in the car. (Botta et al., 2014).

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Answer 2:
Twisted Pair Cable coaxial Pair Cable Fibre Pair Cable
Bandwidth 0-4 KHz 0 to 475 MHz 186 to 370 Thz
Cost inferred Medium More than twisted High
Security pattern Low Low than the fibre High
Interference
rating
Medium but lower than
the coaxial
Medium less than the
fiber
Low
distance 2.5 km 1 to 10 km 39 km
The other three types of the cables are:
a. UTP: This is the Unshielded Twister Pair Cable which is for handling the connections
with the standards set to designator which wire is connected with the connector.
Document Page
The UTP cost for this is low, where the speed range from 1 to 100 M with the higher
attenuation, higher interference and the lower security range.
b. STP: The Shielded Twisted Pair Cable which is for handling the electrical frequency
interference and working on the shielding with the foil.
The STP is where the cost is medium set in between 1 to 150 M with the higher range of the
attenuation, medium interference and the lower security.
c. Radio: This includes the cost which is at the medium range with the speed that is set at 1-
10M and there is a variation in the attenuation depending upon the signals, with high
interference possibility and so the security is also less.
Answer 3:
a. Sensors: Internet of Things is important and could not be set without any smart sensors
where there is a growth and a proper use of the technology. Here, there are
transformations set for the manufacturers to implement and work towards the better
Document Page
connectivity and the analytics for the supply chain. This includes how there is a
possibility to work on the smart sensors which include the identification of the items,
locating them and then handling them with respect to the environmental conditions. The
major advantage is that it is able to work on the different embedded products which could
be important for improving the different processes of manufacturing and creating the new
revenue resources. The disadvantage for this is that the sensors are leading to the loss of
jobs of the people. (Borgia, 2014).
The example and the applications for the same are: measuring the temperature, humidity and
then motion, light etc.
b. RFID: RFID works on the technology which is for the tracking purpose and is used for
the tagging to track the location for the different products. This includes how the RFID
works over the other devices which is based on providing the unique identified for the
object. The technology is there for working on the high frequency of the devices where
the major reason comes for the use of the lack of the standards in the industry. The
company has been able to invest in the RFID with the control and the benefits which
comes when the items are tracked from company.
The major issues with RFID is the reader collision and the tag collision where the reader
collision is when the two signals tend to overlap. With this, there is a need to tap on the response
to the queries. With this, the tag collision occurs with the presenting in the small areas where it is
easy for the vendors to properly develop the systems to respond to the tags one at a time.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
The best example for this is the animal tracking tags with the credit shapes for the use in the
access applications. It is important to identify the dogs for the permanent identification, where
the dog owners had long used tattoos. (Jing et al., 2014).
c: Video Tracking: This is properly detecting the moving of the objects which is through
the use of the camera. For this, the IoT the focus is on how to handle the relative purpose of
moving the fast frame with relative effect to the frame rate. This leads to the increased
complexity with the tracking of the objects which change the orientation over the time.
One of the example for the same is the video compression which is divided into the macroblocks
and used for the motion vector that is given by the different motion parameters. Inorder to
perform the video tracking, the algorithm is based on the sequential video frames with the output
for the movement of the targets. There are different algorithms with the strength and the
weakness and for the target representation and location.
The issues are of the performance as it is difficult to handle and check whether the movement
cover is covering all or not.
Answer 4:
There is issue related to the security and the privacy which is considered to be the major concern
for the information technology. For this, there are different technologies which are set with the
marketing share to get their standards. The securing of the devices and the applications is
important as IoT allow the hackers to exploit for the common vulnerability of the IoT device
platform set in the different class structures. (IoT, 2014). The low costs of the devise with the
producers from issuing the security patches is there, where the privacy is about how the
connectivity is important for the data creation that is associated to the objects. The valuable data
Document Page
is set with the leveraging value where the data is for the proper purposes and the profit. The
privacy is mainly to protect the individuals from the exposure in the IoT environment with the
logical entity or the object that is for the unique identifier. The ability is also to communicate and
work on the Internet of things over the network. Here, there are different end points where the
data can transmit with the other points and then communicate. The interoperability is important
for the functioning with the networked elements at the home, where there are issues related to the
fragmentation of the data that comes from the different types of the endpoints, for the analysis,
collation and the gathering of all the sensitive information. The security has not been important
for the product designing.
Answer 5:
The time needed for the requesting the trigger = 1s
The round trip delay in propagation is 12ms
The processing time request is 3ms
The time for the application transport is 2ms
Hence the total is 1.019s
Here it is seen that there is a proper communication which could be done at the time when the
request for the particular transaction is being made. This is set at the time to process the requests
and then make use of the round trip times. It becomes half of the data transport.
Hence, 6+2 ms= 8ms.
1 out of 9
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]