IoT Security, Privacy and Design

Verified

Added on  2020/02/24

|7
|1238
|72
AI Summary
This assignment delves into the critical aspects of security and privacy within the Internet of Things (IoT). It highlights the inherent vulnerabilities of IoT systems to hacking and data breaches, emphasizing the risks associated with personal information exposure. Furthermore, the assignment examines the efficiency of applications designed for IoT environments, analyzing factors like processing time, communication delays, and resource consumption. A specific case study is presented where an application's design choices are evaluated based on their impact on system performance.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INTERNET OF THINGS
Internet of Things
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
INTERNET OF THINGS
Table of Contents
1. Answer 1.........................................................................................................................2
2. Answer 2..........................................................................................................................2
3. Answer 3..........................................................................................................................4
4. Answer 4..........................................................................................................................5
5. Answer 5..........................................................................................................................5
6. Answer 6..........................................................................................................................5
7. References........................................................................................................................7
Document Page
2
INTERNET OF THINGS
1. Answer 1
The best or most efficient interface for a system is no or negligible user interface because,
with the involvement of UI, people are faced with counterintuitive interaction procedures that are
tailored to the necessity of a computer. Therefore, people are compelled to navigate variable and
complex databases to obtain even the simple information. For example, making payment for
food using Smartphone app, a user has to undergo a multiple steps such as taking his phone out,
unlocking the screen, entering the password, and logging into the bank app and undergo a
number of steps to make the payment finally. However, with the elimination of the involvement
of interface, the user can peacefully eat his food without worrying about the UI and can pursue
his/ her natural course of action. Another example can be, use of a Smartphone UI to unlock a
car, which also includes a number of steps such as unlocking the phone entering the password,
signing onto the app and so on instead of just simply walking to the car and unlocking the door,
which is much more simple and easier. Therefore, it can be concluded that the best interface of a
system is no interface (Choi & Lee, 2012).
2. Answer 2
The comparison among the bandwidth, distance, interface rating, cost and security are
elaborated in the following table (Noé, 2016)-
Bandwidth Distance Interface rating Cost Security
Twisted pair
Types
16-100 MHz
(Acatauassu et
al.,.2013)
Short distance Low noise
cancelation
high Secure
Coaxial 4000 Hz Medium Higher medium Secure
Document Page
3
INTERNET OF THINGS
cable distance compared to
twisted cable
Fibre optic 500 MHz considerable
large distance
Highest
interface rating
low Less secure
Types of twisted pair cable
Unshielded Twisted Pair (UTP) Cable
Shielded Twisted Pair (STP) Cable
LAN Cable
Types of Coaxial cable
RG-6/UQ
RG-8/U
RG 7
Types fibre optic
Ethernet cabling
Interconnecting cabling
Networking cabling
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
INTERNET OF THINGS
3. Answer 3
Sensors RFID Video tracking
Advantages 1) Capable of quickly
gathering and recording
the data
2) can displays graphs
and details of data in
real time
1) Radio Frequency
identification number
can wireless scan a tag
to collect information
(Ajami & Carter, 2013)
2) Offers very high
speeds as it can scan
tags in milliseconds
3) Cost is generally low
1) Offers real time
monitoring of data
2) helps in keeping
track of people or
objects
3) Modern video
tracking enables video
analysis as well
Disadvantages 1) Distance limitation
2) slow response
(Ripka & Tipek, 2013)
1) Expensive in
comparison of bar-
coding system
2) Needs extensive
training for use
1) Expensive system
2) depends on area of
application
Key requirements 1) microcontroller
2) transceiver
3) external memory
4) power source
1) Antenna
2) Transceiver
3) Transponder
1) Video camera
2) transceiver
3) external memory
Application 1) In speed sensing
2) In temperature
sensing
1) to tag items in stores
2) in animal
identification by
implanting RFID track
1) In stores to keep
track of customers
2) roads to keep track
of vehicles and so on
Document Page
5
INTERNET OF THINGS
4. Answer 4
Issues that creep in with security and privacy of internet of things are as follows-
1) The system is very vulnerable to hacking and therefore has privacy issues
2) The distributed interconnected devices in IOT are capable of obtaining personal data
and can be a problem in case details regarding money transfer (Sicari et al., 2015).
3) The security is weak as a large number of devices are connected together.
5. Answer 5
The application triggers a request every 1 s (given)
The round-trip propagation delay between the application and the sensor is 12 ms (given)
On average the sensor consumes 3 ms to process each request (given).
The application consumes 2 ms to send or receive any message (given)
Hence, the total time used by the application is 1+ 12 + 3 + 2 ms = 18 ms.
Therefore, if the application blocks all the requests the application would be saving 18 ms
for the system. Thus, the designed application would be more efficient than the current model.
6. Answer 6
Nielsen’s law states that users’ bandwidth grown 50% per year. Therefore, the high end
of user connection speed also grown by 50% per year.
Document Page
6
INTERNET OF THINGS
Nielsen’s law is similar to Moore’s law. Moore’s law states that computers can double its
capability in every 18 months, which corresponds to a growth of 60% annually. The data is
similar to Nielsen’s but 10 % less (Cavin, Lugli & Zhirnov, 2012).
Implication of internet of things is that IOT deals with connection of devices that works
together. According to Nielsen and Moore’s law, the performance of these devices increases by
50% a year.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]