Assignment | Project Proposal and Plan

Verified

Added on  2022/10/07

|7
|1830
|16
Assignment
AI Summary
Title: Emerging Technology and Innovation Topic Project Blog ( Web address provided) Weekly Progress Reports Plan (In class, Discussion Board or Project Blog entries) Rationale Problem domain Purpose and justification Supervisor Approval Research Questions Conceptual or Theoretical Framework Methodology Analysis of sources of information (EndNote, APA Referencing Style) Research method(s) Data collection or systems design methods Ethical Issues Compliance Requirements (Workplace, Industry or Government regulations) Project Plan Deliverables (Annotated Bibliography, Journal Paper, Report, Seminar) Work breakdown structure (WBS) Risk Analysis Duration Gantt chart References Appendix (if required) Please refer to the link which i provide for the topic i have chosen: http://thinkspace.csu.edu.au/blockchaininiot/. PLEASE WORK ON THAT TOPIC ONLY DO NOT WORK ON ANY OTHER TOPIC PLEASE

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
ITC571 - Project Proposal and Plan
1000 – 2000 Words (5-6 pages)
Full Name
Student ID
Subject ITC571 – Emerging Technology and Innovations
Assignment No Project Proposal and Plan
Due Date 09-August-2019
Lecturer’s Name Malka N. Halgamuge
Title
The title of the paper is “Blockchain in IoT”.
I. INTRODUCTION
The paper mainly reflects on the use of Blockchain technology within IoT and it is found that blockchain is
considered as one of the significant keys for the peer-to peer network which the IoT based industry. Proper
decentralization of the blockchain ledger assists in making sure that the storage as well as computation can
generally spread across a number of devices which does not occur on the same central server (Ren et al., 2016).
Therefore, the situation whereas number of failures occurs generally causes breakdown of the IoT network that
will no longer exists.
In this paper a number of articles as well as journal papers are reviewed for making sure that proper data as well
as information associated with biometric technology in IoT is beneficial in tracking a number of devices that are
connected. The paper also showcases a project plan that helps in depicting the work breakdown structure, project
duration as well as risks which are linked with the project.
2. Rationale
1. Problem domain
It is found that one of the major limitations of “Internet of Things” is that it is mainly dependent on the
centralized as well as brokered communication models. It is found that having proper peer to peer model of
communication can be one of the best solutions however the major challenge that is associated with peer to peer
network is that it helps in providing both security as well as privacy.
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2. Purpose and justification
It is analyzed that the utilization of blockchain in IoT can be helpful within the IoT industry in a quite
sustainable way. It is identified that the Blockchain within IoT is helpful in tracking the connected devices such
that there can be proper coordination as well as processing that involves a number of devices without travelling
through server route for each of the communication.
3. Supervisor Approval
Yes, the supervisor provides approval for creating the project proposal and project plan so that the paper
can be able to reflect the importance of biometric in internet of things and for showcasing how it is helpful in
tracking the connected devices.
4. Research Questions
The research questions are:
What are the issues that can be achieved by utilizing blockchain in IoT?
What are the benefits of using Blockchain in IoT?
What are the issues that get resolved by using Blockchain in IoT?
5. Conceptual or Theoretical Framework
According to Dhillon and Kalra (2017), that IoT mainly has centralized communication models which is
based on one of the traditional technologies. It is found that proper peer-to peer communication model can be
utilized in the place of centralized communication model however, it is identified that security is one of the major
challenges of peer to peer communication. Therefore, the utilization of blockchain in IoT is considered to be one
of the best solutions.
It is stated by Tomicic, Grd and Baca (2018) that blockchain in IoT is helpful in properly tracking a huge
number connected devices and for this proper coordination as well as processing related with the devices are
present without going through the traditional client or server route for undertaking each of the communication.
This will further be helpful in minimizing the costs that is associated with the installation as well as maintenance
of the servers for an IoT network. It is found that due to a number of cost savings, massive scalability of the IoT
networks can be considered as one of the most sustainable option (Lee et al.,2017)
It is opined by Olazabal et al. (2019) that blockchain technology mainly utilizes different types of
cryptographic algorithms which helps in making sure that the data of the consumers within the IoT network is
considered to be very much secure as well as confidential. In addition to this, blockchain is found to be tamper-
proof and therefore it is not much vulnerable to the cyber-attacks.
2
Document Page
II. MATERIALS AND METHODS
6. Methodology
1. Analysis of sources of information (EndNote, APA Referencing Style)
The information that is used for reflecting the significance of Blockchain is mainly collected with the help
of secondary data collected method by reviewing a number of journal articles and an academic paper. The sources
of information are considered to be APA referencing style with the help of which proper information about the
research can be gained.
2. Research method(s)
System development is the research method that is will be utilized within this project as with the help of
this particular methodology, the research mainly falls within the category of development as well as formulative
type and assists in providing proper idea about the way in which the problem can be resolved (Johnston, 2017).
3. Data collection or systems design methods
Secondary data collection method is mainly utilized for collecting information as well as data. It is found
that secondary data are collected from various journal articles, research papers, academic journals as well as
organizational records in order to understand the benefits of biometric in IoT.
4. Ethical Issues
The ethical issues that are faced are listed below:
It is quite necessary to provide respect to confidentiality as well as anonymity for avoiding ethical issue
The data that is collected through research must be used for academic purpose
5. Compliance Requirements (Workplace, Industry or Government regulations)
It is necessary to utilize Workplace regulation 1992 for successfully setting standards in order to built or
for altering that it will be helpful in meeting the standards for ensuring that when a workplace is built or altered
for providing safe as well as healthy workplace (Harwood et al., 2017).
3
Document Page
IV RESULTS (optional)
7. Project Plan
1. Deliverables (Annotated Bibliography, Journal Paper, Report, Seminar)
The deliverables include:
Project report
Seminar result
Journal paper
Annotated Bibliography
2. Work breakdown structure (WBS)
Figure 1: Work breakdown structure
(Source: Created by Author)
3. Risk Analysis
Risk Risk description Impact Likelihood Mitigation
Schedule slippage If the project
manager unable to
focus on project
tracking then it can
High High The schedule of the
project must be
tracked on daily
basis for finishing
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
cause a number of
issues.
the work on time.
Lack of budget If the budget that is
needed is not
estimated at the
initial phase
properly then it can
cause a number of
issues.
High High It is quite important
to estimate the
budget properly
Technical issue If the team
members are
unexperienced, they
can make a
technical mistake
during the project
progress that can
create a lot pf issues
in operation.
High Medium Workshop and
training facility
should be given
4. Duration
As per the below figure, 12 weeks are required for finishing the project “Biometric in IoT” successfully.
Figure 2: Project duration
(Source: Created by Author)
5
Document Page
5. Gantt chart
Figure 3: Gantt chart
(Source: Created by Author)
V TIMELINE
Week Task
1 In the first week, determination of issues and identification of solutions are done.
2 In this well, feasibility is analyzed and proper charter is created.
3 In the third week team members are recruited
4 In the fourth week, project plan is created.
5 In this week, resource, finance as well as quality plan is developed
6 In this week, project design is developed
7 In this specific week, prototype is created and approval for the entire project is
achieved
8 In 8th wee, authenticity feature gets completed
9 In the 9th week, high-end monitoring based secured system is developed
10 In this week, smart and creative user interface is developed
6
Document Page
11 In this week, project is reviewed
12 In this week documentation is made.
8. REFERENCES
Dhillon, P. K., & Kalra, S. (2017). Lightweight biometrics based remote user authentication scheme for
IoT services. Journal of Information Security and Applications, 34, 255-270.
Harwood, D., Monaghan, P. F., O’Brien, B., & Downey, A. (2017). Using information technology to
automate integrated compliance management. In ISO 14001 (pp. 90-99). Routledge.
Johnston, M. P. (2017). Secondary data analysis: A method of which the time has come. Qualitative and
quantitative methods in libraries, 3(3), 619-626.
Lee, S., Sa, J., Cho, H., & Park, D. (2017). Energy-Efficient Biometrics-Based Remote User
Authentication for Mobile Multimedia IoT Application. KSII Transactions on Internet &
Information Systems, 11(12).
Olazabal, O., Gofman, M., Bai, Y., Choi, Y., Sandico, N., Mitra, S., & Pham, K. (2019, January).
Multimodal Biometrics for Enhanced IoT Security. In 2019 IEEE 9th Annual Computing and
Communication Workshop and Conference (CCWC) (pp. 0886-0893). IEEE.
Ren, C. X., Gong, Y. B., Hao, F., Cai, X. Y., & Wu, Y. X. (2016). When biometrics meet iot: A survey.
In Proceedings of the 6th International Asia Conference on Industrial Engineering and
Management Innovation (pp. 635-643). Atlantis Press, Paris.
Shahim, L.P., Snyman, D., Toit, T. and Kruger, H., 2016, July. Cost-Effective biometric authentication
using leap motion and IoT devices. In 10th Int'l. Conf. Emerging Security Info., Systems and
Technologies (pp. 10-13).
Tomičić, I., Grd, P., & Bača, M. (2018, May). A review of soft biometrics for IoT. In 2018 41st
International Convention on Information and Communication Technology, Electronics and
Microelectronics (MIPRO) (pp. 1115-1120). IEEE.
7
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]