Internet of Things Assignment Solution, University Name
VerifiedAdded on 2020/02/24
|5
|857
|277
Homework Assignment
AI Summary
This document presents a comprehensive solution to an Internet of Things (IoT) assignment, addressing several key aspects of the technology. The solution begins by exploring the concept of user interfaces, arguing for a minimalist approach and providing examples. It then delves into IoT security, detailing confidentiality, freshness, integrity, authenticity, and availability. The assignment also discusses privacy concerns, differentiating between data-oriented and context-oriented privacy. Furthermore, a performance analysis is conducted, evaluating the efficiency of an application model. Finally, the solution examines Nielsen's Law in the context of bandwidth growth. The provided answers are supported by relevant references.

Running Head: INTERNET OF THINGS
Internet of Things
Name of Student-
Name of University-
Author Note-
Internet of Things
Name of Student-
Name of University-
Author Note-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1INTERNET OF THINGS
Answer to Question 1
The best interface for a system is no User Interface- The screens that are used in
this present day are totally depended on unnatural constitution. They are
diminishing in nature and are also inhumane (Bertino, 2016). More amount of
knowledge is needed to use the user interface. More amount of money and as well
as time is also required to use the user interface. Two examples of where user
interface is not useful are:
1. Parking sign that are used in Los Angles in which the data is overloaded.
2. Mystery Meat Navigation is the site that does not show the destination of
the link until when the user takes the cursor on it or clicks the link.
Answer to Question 4
Security from IoT devices- The security that are provided from the Internet of Things devices
are-
Confidentiality- The confidentiality of the data is kept secret by the IoT devices. The data that is
present in the server of the devices are needed to be kept secret.
Freshness- The devices keep the working of the devices fresh so that the new user can get a
chance to use the device in a new way.
Integrity- The integrity of the data should be maintained. It is to be seen that the data remains as
original when it is send to receiver from sender (Velandia et al., 2016). The content of the data
should not change.
Answer to Question 1
The best interface for a system is no User Interface- The screens that are used in
this present day are totally depended on unnatural constitution. They are
diminishing in nature and are also inhumane (Bertino, 2016). More amount of
knowledge is needed to use the user interface. More amount of money and as well
as time is also required to use the user interface. Two examples of where user
interface is not useful are:
1. Parking sign that are used in Los Angles in which the data is overloaded.
2. Mystery Meat Navigation is the site that does not show the destination of
the link until when the user takes the cursor on it or clicks the link.
Answer to Question 4
Security from IoT devices- The security that are provided from the Internet of Things devices
are-
Confidentiality- The confidentiality of the data is kept secret by the IoT devices. The data that is
present in the server of the devices are needed to be kept secret.
Freshness- The devices keep the working of the devices fresh so that the new user can get a
chance to use the device in a new way.
Integrity- The integrity of the data should be maintained. It is to be seen that the data remains as
original when it is send to receiver from sender (Velandia et al., 2016). The content of the data
should not change.

2INTERNET OF THINGS
Authenticity- The authentication of the data should be secured. It must be seen that original user
uses the device and that is not used by some hackers or intruders.
Availability- The device is available for the entire authenticated user who uses the devices. It
must be seen that the entire user uses the device smoothly an in a secure way.
Privacy from IoT devices- Mainly of two types of privacy is achieved from the privacy of IoT
devices- Data Oriented Privacy and Context-Oriented Privacy.
Data Oriented Privacy- Data of a asystem is controlled by the data oriented privacy. This has
two categories in particular. External type- in this external type attack, unauthorized person not
authorized with network knows about the data communication that is connected between the
sensor nodes (Hecht, 2015). Internal type- in internal type attack node of the network first of all
captured and then the network is reprogrammed by an attacker who gets access on the network to
receive all data of the network. Internal attack is much more dangerous than external type attack.
Context-Oriented Privacy- Context oriented privacy protects the information that are contextual
in a network. The time and location that are transferred over the server signals falls under the
contextual information. Contextual data mainly depends on transmission control devices.
Answer to Question 5
Given: Triggering time of the application: 1s
The propagation of round trip delay between application and sensor: 12ms
Time to process each request: 3ms
Time taken to send or receive any data: 2ms
Authenticity- The authentication of the data should be secured. It must be seen that original user
uses the device and that is not used by some hackers or intruders.
Availability- The device is available for the entire authenticated user who uses the devices. It
must be seen that the entire user uses the device smoothly an in a secure way.
Privacy from IoT devices- Mainly of two types of privacy is achieved from the privacy of IoT
devices- Data Oriented Privacy and Context-Oriented Privacy.
Data Oriented Privacy- Data of a asystem is controlled by the data oriented privacy. This has
two categories in particular. External type- in this external type attack, unauthorized person not
authorized with network knows about the data communication that is connected between the
sensor nodes (Hecht, 2015). Internal type- in internal type attack node of the network first of all
captured and then the network is reprogrammed by an attacker who gets access on the network to
receive all data of the network. Internal attack is much more dangerous than external type attack.
Context-Oriented Privacy- Context oriented privacy protects the information that are contextual
in a network. The time and location that are transferred over the server signals falls under the
contextual information. Contextual data mainly depends on transmission control devices.
Answer to Question 5
Given: Triggering time of the application: 1s
The propagation of round trip delay between application and sensor: 12ms
Time to process each request: 3ms
Time taken to send or receive any data: 2ms
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3INTERNET OF THINGS
The total time that the application takes is: 1ms + 12ms + 3ms + 2ms = 18ms
. The budget of time that is saved is 18ms. Since the budget time which is saved is
18ms, the present model is less efficient than the application model that is
proposed.
Answer to Question 6
Neilsen law states that the bandwidth that is available with the connections of high end
broadband will increase by half of its available bandwidth each year, which leads to compound
growth of 57x in capacity in ten years (Miguelez, Esser & Slowik, 2015). Neilsen proposed that
the connection of high end broadband will get higher by 50% every year whereas Moore stated
that in 18 months it will double itself. The law stated that Jakob Neilsen stated is 10% less than
the law that is stated by Moore’s Law.
The total time that the application takes is: 1ms + 12ms + 3ms + 2ms = 18ms
. The budget of time that is saved is 18ms. Since the budget time which is saved is
18ms, the present model is less efficient than the application model that is
proposed.
Answer to Question 6
Neilsen law states that the bandwidth that is available with the connections of high end
broadband will increase by half of its available bandwidth each year, which leads to compound
growth of 57x in capacity in ten years (Miguelez, Esser & Slowik, 2015). Neilsen proposed that
the connection of high end broadband will get higher by 50% every year whereas Moore stated
that in 18 months it will double itself. The law stated that Jakob Neilsen stated is 10% less than
the law that is stated by Moore’s Law.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4INTERNET OF THINGS
References
Bertino, E. (2016, December). Data privacy for IoT systems: concepts, approaches, and research
directions. In Big Data (Big Data), 2016 IEEE International Conference on (pp. 3645-
3647). IEEE.
Hecht, J. (2015). Understanding fiber optics. Jeff Hecht.
Miguelez, P., Esser, S. M., & Slowik, F. (2015). U.S. Patent No. 8,958,694. Washington, DC:
U.S. Patent and Trademark Office.
Velandia, D. M. S., Kaur, N., Whittow, W. G., Conway, P. P., & West, A. A. (2016). Towards
industrial internet of things: Crankshaft monitoring, traceability and tracking using
RFID. Robotics and Computer-Integrated Manufacturing, 41, 66-77.
References
Bertino, E. (2016, December). Data privacy for IoT systems: concepts, approaches, and research
directions. In Big Data (Big Data), 2016 IEEE International Conference on (pp. 3645-
3647). IEEE.
Hecht, J. (2015). Understanding fiber optics. Jeff Hecht.
Miguelez, P., Esser, S. M., & Slowik, F. (2015). U.S. Patent No. 8,958,694. Washington, DC:
U.S. Patent and Trademark Office.
Velandia, D. M. S., Kaur, N., Whittow, W. G., Conway, P. P., & West, A. A. (2016). Towards
industrial internet of things: Crankshaft monitoring, traceability and tracking using
RFID. Robotics and Computer-Integrated Manufacturing, 41, 66-77.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.