IoT Security and Performance Challenges
VerifiedAdded on 2020/02/24
|8
|1452
|315
AI Summary
This assignment delves into the multifaceted challenges faced by the Internet of Things (IoT) ecosystem. It examines security and privacy concerns related to authentication, authorization, and data protection, particularly within resource-constrained devices. The impact of Nielsen's Law, which dictates the rapid growth of internet bandwidth demands, is analyzed in the context of IoT applications. Furthermore, the assignment investigates performance challenges associated with efficient data transmission, considering factors such as latency, packet loss, and bandwidth limitations.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
report
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents
Answer 1:.........................................................................................................................................2
Answer 2:.........................................................................................................................................2
Answer 3:.........................................................................................................................................4
Answer 4:.........................................................................................................................................5
Answer 5:.........................................................................................................................................6
Answer 6:.........................................................................................................................................6
References........................................................................................................................................8
Answer 1:.........................................................................................................................................2
Answer 2:.........................................................................................................................................2
Answer 3:.........................................................................................................................................4
Answer 4:.........................................................................................................................................5
Answer 5:.........................................................................................................................................6
Answer 6:.........................................................................................................................................6
References........................................................................................................................................8
Answer 1:
The interface makes our life complicated with the example of phone app to unlock the door of
the car, the ill-conceived applications for the old printer or the attempts of the social network by
the companies like coke. The interface also makes us their slaves with some of the issues like the
title name, mandatory sign up etc. (Liu et al, 2016)
The advantage for the user interface is the proper designing which helps in solving the problems.
But it will be important to make good decisions which is possible through the big data and
computing power. The examples related to the companies like how Google and Facebook are
fighting to keep their system with the better shareholders rather UX. Example, the sensors and
the automation could also lead to the issues with the UX, car air bags, automatic doors.
The GUI could also be for the adjustment for the overriding automated behavior and defaults.
This is the example for the smart lamp which can use the GUI for the overriding and handling
the tune settings.
Answer 2:
Twisted Pair Cable coaxial Pair Cable Fibre Pair Cable
Bandwidth 0-3.5 KHz 0 to 500 MHz 186 to 370 Thz
Cost Medium to a certain
limit
More than twisted
pair cable.
Highest
Security Low than the other Low than the other. Highest
The interface makes our life complicated with the example of phone app to unlock the door of
the car, the ill-conceived applications for the old printer or the attempts of the social network by
the companies like coke. The interface also makes us their slaves with some of the issues like the
title name, mandatory sign up etc. (Liu et al, 2016)
The advantage for the user interface is the proper designing which helps in solving the problems.
But it will be important to make good decisions which is possible through the big data and
computing power. The examples related to the companies like how Google and Facebook are
fighting to keep their system with the better shareholders rather UX. Example, the sensors and
the automation could also lead to the issues with the UX, car air bags, automatic doors.
The GUI could also be for the adjustment for the overriding automated behavior and defaults.
This is the example for the smart lamp which can use the GUI for the overriding and handling
the tune settings.
Answer 2:
Twisted Pair Cable coaxial Pair Cable Fibre Pair Cable
Bandwidth 0-3.5 KHz 0 to 500 MHz 186 to 370 Thz
Cost Medium to a certain
limit
More than twisted
pair cable.
Highest
Security Low than the other Low than the other. Highest
cables
Interference
rating
Medium but lower than
the coaxial
Medium Lowest
distance 2.5 km 1 to 9.6 km 41 km
With this it also includes the other cables which are:
a. The UTP which is one of the Unshielded Twisted Pair cable. This is for the setting of
standardized range with the easy connection to the connector.
Here, the cost of UTP is found to be low with the speed that ranges from the limit of 1 to
100M. Along with this, there is a proper of attenuation which is higher and a low range of
security. (Ray et al., 2016)
b. STP: This is for the Shielded Pair Cable
Interference
rating
Medium but lower than
the coaxial
Medium Lowest
distance 2.5 km 1 to 9.6 km 41 km
With this it also includes the other cables which are:
a. The UTP which is one of the Unshielded Twisted Pair cable. This is for the setting of
standardized range with the easy connection to the connector.
Here, the cost of UTP is found to be low with the speed that ranges from the limit of 1 to
100M. Along with this, there is a proper of attenuation which is higher and a low range of
security. (Ray et al., 2016)
b. STP: This is for the Shielded Pair Cable
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
It is found to be handling the interference frequency with the range that is for the shielding of
foil.
c. Radio: Here, the costs are found at the range which is medium. The speed is set at 10M
with the different standards to handle the power of attenuation and working on the signal
processing. For this, there are signals which are depending upon the possibility for
interference where there is a lesser amount of security.
Answer 3:
Sensors RFID Video Tracking
They are important devices
which are able to detect the
system with the specific
inputs that are based on the
moisture, light and the
pressure. They are important
for the measurement of the
temperature and the pressure
in agriculture, farms and the
retail settings. The only issue
with them is that all the
automatic processes leads to
mainly affecting the jobs of
This is considered for the
radio frequency where the
detection is based on the
services that are for the
magnetic strip. The
applications are that it is used
for the credit card and ATM
card to identify the
information. The issue is the
lack of the standards in the
industry where it is tough to
handle the tag and the reader
collision. (Rui et al., 2016).
This occurs when the signals
It is considered important for
the augmented reality and for
handling the traffic control. It
is considered to be time
consuming with the amount
of data that has been there for
the object recognition which
is considered to be a
challenging issue. The
examples for this are the
tracking with the use of the
planar objects and the motion
of the model is also set under
the 2D transformation. It
foil.
c. Radio: Here, the costs are found at the range which is medium. The speed is set at 10M
with the different standards to handle the power of attenuation and working on the signal
processing. For this, there are signals which are depending upon the possibility for
interference where there is a lesser amount of security.
Answer 3:
Sensors RFID Video Tracking
They are important devices
which are able to detect the
system with the specific
inputs that are based on the
moisture, light and the
pressure. They are important
for the measurement of the
temperature and the pressure
in agriculture, farms and the
retail settings. The only issue
with them is that all the
automatic processes leads to
mainly affecting the jobs of
This is considered for the
radio frequency where the
detection is based on the
services that are for the
magnetic strip. The
applications are that it is used
for the credit card and ATM
card to identify the
information. The issue is the
lack of the standards in the
industry where it is tough to
handle the tag and the reader
collision. (Rui et al., 2016).
This occurs when the signals
It is considered important for
the augmented reality and for
handling the traffic control. It
is considered to be time
consuming with the amount
of data that has been there for
the object recognition which
is considered to be a
challenging issue. The
examples for this are the
tracking with the use of the
planar objects and the motion
of the model is also set under
the 2D transformation. It
common man.
The sensors are used for
handling and maintaining the
level which is for the
detection of the levels with
the proper management and
the recycling purpose.
from the two overlaps where
the systems are also set to
avoid any of the problems.
The tag collision is when
there are different tags in the
small area for the vendors.
includes the increase in the
complexity of the problems
with the tracking of the object
change orientation over the
time.
Answer 4:
The issues are related with the designing authentication and then working over the authentication
and authorization with the speed, pressure, temperature or the heart rate. It includes the security
and the privacy perspectives which are for the devices that have limited memory with the control
of the infrastructure. The need is of the privacy and the security concerns that are set to process
the capacity and the batter power. The mechanisms are based on handling unique security
locations which offer a low bandwidth which is prone to the loss of the data packets at the time
of transfer. The other issue is also for the fragmentation, where the security is not standardized
for the application area. It affects the security with the need of interoperability device produced
by the development of the vendors. (McEwen et al., 2013).The privacy protection is depending
upon how the individual users are able to work and configure the security settings.
The sensors are used for
handling and maintaining the
level which is for the
detection of the levels with
the proper management and
the recycling purpose.
from the two overlaps where
the systems are also set to
avoid any of the problems.
The tag collision is when
there are different tags in the
small area for the vendors.
includes the increase in the
complexity of the problems
with the tracking of the object
change orientation over the
time.
Answer 4:
The issues are related with the designing authentication and then working over the authentication
and authorization with the speed, pressure, temperature or the heart rate. It includes the security
and the privacy perspectives which are for the devices that have limited memory with the control
of the infrastructure. The need is of the privacy and the security concerns that are set to process
the capacity and the batter power. The mechanisms are based on handling unique security
locations which offer a low bandwidth which is prone to the loss of the data packets at the time
of transfer. The other issue is also for the fragmentation, where the security is not standardized
for the application area. It affects the security with the need of interoperability device produced
by the development of the vendors. (McEwen et al., 2013).The privacy protection is depending
upon how the individual users are able to work and configure the security settings.
Answer 5:
Here, the time for trigger is 1sec, with the round trip for 12ms and the processing time being
3ms. The total time that is there is 1.019sec. It is seen that for the communication, it is important
to focus on the transmission that need to be done. For this, the processing is based on the use of
the roundtrip which become half of the data transportation. So, 6+2ms=8ms.
Answer 6:
Nielsen’s Law works on the outliving of Moore’s Law where the research is based on the
usability goals with the learnability, with efficiency, errors and satisfaction. Here there are
computation based on the guidelines which can easily advocate the web designing. The high-end
users grow the bandwidth by 50% in a year, where for the Moore’s law this is less by 10%.
The above image show about the Nielsen law of the Internet Bandwidth with the telecom
companies which are being conservative for installation of the equipment and working on the
money on bandwidth. (Ning, 2013). This will be also for the user base which seems to be broader
with the mainstream users that are likely to be set at the low end rather than the high end. Like
Moore, Nielsen law is for the leading edge where the acknowledgement is based on the
Here, the time for trigger is 1sec, with the round trip for 12ms and the processing time being
3ms. The total time that is there is 1.019sec. It is seen that for the communication, it is important
to focus on the transmission that need to be done. For this, the processing is based on the use of
the roundtrip which become half of the data transportation. So, 6+2ms=8ms.
Answer 6:
Nielsen’s Law works on the outliving of Moore’s Law where the research is based on the
usability goals with the learnability, with efficiency, errors and satisfaction. Here there are
computation based on the guidelines which can easily advocate the web designing. The high-end
users grow the bandwidth by 50% in a year, where for the Moore’s law this is less by 10%.
The above image show about the Nielsen law of the Internet Bandwidth with the telecom
companies which are being conservative for installation of the equipment and working on the
money on bandwidth. (Ning, 2013). This will be also for the user base which seems to be broader
with the mainstream users that are likely to be set at the low end rather than the high end. Like
Moore, Nielsen law is for the leading edge where the acknowledgement is based on the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
designing of the gaps and then handling the leading process nodes. The Nielsen law address the
fastest speed for the high-end internet users.
The major implications for the Internet of things is about the rapid growth for the customer smart
products which is found to be difficult to handle the mainstream audiences. Here the effect is
also on the speed, capacity for the transmission of data, storage and the durability.
fastest speed for the high-end internet users.
The major implications for the Internet of things is about the rapid growth for the customer smart
products which is found to be difficult to handle the mainstream audiences. Here the effect is
also on the speed, capacity for the transmission of data, storage and the durability.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.