Comprehensive Project Plan for IoT Security Application

Verified

Added on  2020/03/13

|10
|1654
|177
Project
AI Summary
This project plan outlines the development of an integrated IoT security solution designed to enhance the security of IoT applications. The plan encompasses various aspects, including the rationale for the project, problem domain analysis, and the purpose and justification for the application's development. The project incorporates research questions, a conceptual framework, and a detailed methodology, including research methods, data collection techniques, and data analysis processes. The plan also specifies the deliverables, such as application design documents, source code, test reports, security reports, and system documentation. A work breakdown structure, risk analysis, and a Gantt chart are included to provide a comprehensive overview of the project timeline and potential challenges. The project employs an adaptive, agile methodology to accommodate changing requirements and ensure alignment with client expectations. The application aims to address security risks and provide solutions against potential attacks, with a focus on platform independence and the inclusion of the latest security mechanisms. The project plan also addresses budget and schedule risks, operational errors, security risks, technical risks, and quality risks. The project's success hinges on delivering a robust and secure IoT security application.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
IoT Security Application
Project Plan
8/17/2017
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Project Plan
Table of Contents
Rationale.....................................................................................................................................................3
Problem Domain......................................................................................................................................3
Purpose and Justification.........................................................................................................................3
Sponsor or Supervisor Recommendation.....................................................................................................4
Research Questions.....................................................................................................................................4
Conceptual or Theoretical Framework........................................................................................................4
Methodology...............................................................................................................................................5
Research and Systems Development Method..........................................................................................5
Data collection.........................................................................................................................................5
Analysis of data.......................................................................................................................................5
Project Plan.................................................................................................................................................6
Deliverables.............................................................................................................................................6
Work Breakdown Structure.....................................................................................................................7
Risk Analysis...........................................................................................................................................7
Gantt chart...............................................................................................................................................8
References.................................................................................................................................................10
Document Page
Project Plan
Rationale
Problem Domain
Internet of Things (IoT) is a discipline that allows the intern-connection and inter-networking of
various elements and appliances to achieve a common goal. The elements that are involved in an
IoT application range from computer systems, web servers and networks to household appliances
and electronic gadgets. There is also an active involvement of smartphones, laptops, tablets and
databases in most of the IoT applications (Gigli & Koo, 2011).
Internet of Things (IoT) Application
IoT applications are being used in a number of different sectors to provide solutions for a variety
of different problems. Some of the commonly used IoT applications being used in the current
times include smart parking systems, house automation system, office automation system etc.
Purpose and Justification
There are a number of security issues that have been observed in case of any of the IoT
application. It is because of the reason that there are varied networks, devices and access points
that are involved in these applications. The purpose of the project is to develop an integrated IoT
Document Page
Project Plan
security solution that may be integrated with the IoT applications to enhance their security (Sah,
2016).
The project will lead to the resolution of the security issues and problems associated with IoT
applications in a cost-effective manner. The project will provide benefits to the business
organizations as they will have an integrated application offering the required security
mechanisms for the enhancement of the security of IoT applications.
Sponsor or Supervisor Recommendation
A large-scale business organization is the sponsor of the project for the development and
deployment of an IoT application for IoT security. The sponsor along with the supervisor and
other stakeholders has come up with the following set of suggestions and recommendations
regarding the application:
The application shall be inter-operable in nature i.e. it should be platform independent
and must offer compatibility with common mobile and web platforms.
The application shall include the latest security mechanisms and protocols for device
security, network security, advanced authentication and access control (Yousuf,
Mahmoud, Aloul & Zualkernan, 2015).
The application shall be flexible and scalable in nature to meet the changing set of
requirements.
There shall be system documentation provided along with the application to allow the
users to understand the steps to install and use the same.
Research Questions
What are the security problems that will be addressed by the IoT security application?
What are the platforms that the application will support and will be operable upon?
What are the non-functional requirements and system qualities that will be included in
the application?
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Project Plan
Conceptual or Theoretical Framework
Research is defined as a process that includes a step by step study and analysis of the research
topic that leads to a scientific development of investigation. A research may include
identification of a problem, problem analysis or development of hypothesis. There are various
research methodologies that may be used (Sood, 2016).
The research that is carried out may be a combination of one or more than one methods to come
to the conclusion of the research.
Methodology
Research and Systems Development Method
The research methodology that has been used in this case is the qualitative method for research
using the action method and grounded theory as the sub-components of the same.
The application development process that may be followed in case of IoT security application is
one of the adaptive approaches. The other methods include predictive methodology such as the
one applied in the Waterfall model. Agile methodology is an adaptive approach that shall be used
and applied in the case of IoT security application. This would allow the development process to
be efficient to take up the changing nature of the requirements and will also present the end-
results in complete adherence with the client requirements (Madakam, 2015).
Data collection
There are information investigation techniques that shall be used for the collection of the data
from varied data sources. The techniques such as interviews, observations and brainstorming
sessions shall be used to collect the specific system requirements and the expectations of the
clients and the end system users. The data shall also be collected from the historical references
and using the data sources associated with the market to understand the market trends and
demands (Kwon & Kim, 2016).
Document Page
Project Plan
Analysis of data
The data regarding the IoT security application to be developed shall then be analyzed using the
automated analytics tools. These tools would automatically analyze the data that is collected to
present the relevant trends and patterns.
Project Plan
Deliverables
Application Design: The design of the IoT security application shall be delivered
comprising of the wireframes, design documents, UI layouts and the diagrams.
Source Code: The functional source code for the application shall be created and
delivered.
Test Report: Testing activities shall be carried out on the application and a test report
shall be submitted comprising of the test case scenarios and their results.
Security Report: The application must provide a security report covering the security
status and the possible threats and attacks. The countermeasures to the identified threats
and attacks shall also be covered in the security report that is created (Feng, 2017).
Closure Report: The report shall mark the end of the project by comprising of the project
activities covered. The lessons that are acquired by the application development team and
the information of acceptance and sign offs shall also be covered in the report.
System Documentation: Help and assistance document, user guide, warranty statement
and disclaimers shall be developed and included along with the application.
Document Page
Project Plan
Work Breakdown Structure
Risk Analysis
The aim of the IoT security application is to provide a solution against several security risks and
attacks that may take place. The project in itself is exposed to certain risks and attacks that may
occur during the timeline of the project.
Budget and Schedule Risks: The project of the development and deployment of the IoT
security application is based upon changing requirements causing a wide scope. The
estimated budget and schedule may go wrong during the actual project execution leading
to inability to submit the deliverables as per the deadline (Balasubramaniam &
Kangasharju, 2013).
IoT Security
Application
System Initiation
Phase
Analysis of System
feasibility - Technical,
financial and
operational basis
Chartering of project
and its completion
Submission of Charter
Milestone One:
Project Charter
Document
System Planning
Phase
Functional and Non-
function System
Requirements
Risks Analysis,
Assessment and
Evaluation
Allocation of schedule
to project activities
Allocation of budget
to project activities
Communication plan
and associated
activities
Creation, completion
and submission of
project plan
Milestone Two:
Project Plan
Document
Application: Execution
Phase
Application Design
Application - UI and
UX Aspects
Review of the
Application Design
Creationof source
code for IoT
application
Unit testing of IoT
application
Review of design and
development activties
Milestone Three:
Source Code
Application Control
Phase
Implementation of the
application
System, Integration
and UI Testing
Perfromance Testing
Trainings to the Users
Milestone Four: Test
Plan
Closure Phase
Acceptance of system
deliverables
Approvals and sign
offs
Lessons learnt during
the project
Creation, completion
and submission of
project closure report
Milestone Five:
Closure Report
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Project Plan
Operational Errors: Many automated tools and solutions will be used in each of the
project phases. This may lead to the occurrence of operational mistakes by the application
development team.
Security Risks: The solution that is aimed to be provided by the application will solve the
problems of many leading to increase in the number of customers. However, there may
be risks associated with information breaching or loss impacting the information and
application security.
Technical Risks: The technical tools such as application development tools and testing
tools may experience a failure during the operations. Such technical faults and failures
may have an adverse impact on the application continuity (Ryu, 2012).
Quality Risks: The quality of the application is required to be maintained and correctly
managed. There may be non-compliance and non-adherence to the defined quality
standards that may be observed.
Gantt chart
Document Page
Project Plan
Document Page
Project Plan
References
Balasubramaniam, S., & Kangasharju, J. (2013). Realizing the Internet of Nano Things:
Challenges, Solutions, and Applications. Computer, 46(2), 62-68.
http://dx.doi.org/10.1109/mc.2012.389
Feng, S. (2017). Smart Home: Cognitive Interactive People-Centric Internet of Things. IEEE
Communications Magazine, 55(2), 34-39.
http://dx.doi.org/10.1109/mcom.2017.1600682cm
Gigli, M., & Koo, S. (2011). Internet of Things: Services and Applications Categorization.
Advances In Internet Of Things, 01(02), 27-31. http://dx.doi.org/10.4236/ait.2011.12004
Kwon, J., & Kim, S. (2016). Levelized Recommendation Method in Internet of Things
Environment. International Journal Of Smart Home, 10(3), 11-20.
http://dx.doi.org/10.14257/ijsh.2016.10.3.02
Madakam, S. (2015). Internet of Things: Smart Things. International Journal Of Future
Computer And Communication, 4(4), 250-253. http://dx.doi.org/10.7763/ijfcc.2015.v4.395
Ryu, M. (2012). Survey on Internet of Things: Toward Case Study. The Smart Computing
Review. http://dx.doi.org/10.6029/smartcr.2012.03.002
Sah, P. (2016). Saving Environment Using Internet of Things: Challenges and the Possibilities.
Advances In Internet Of Things, 06(04), 55-64. http://dx.doi.org/10.4236/ait.2016.64004
Sood, K. (2016). Software-Defined Wireless Networking Opportunities and Challenges for
Internet-of-Things: A Review. IEEE Internet Of Things Journal, 3(4), 453-463.
http://dx.doi.org/10.1109/jiot.2015.2480421
Yousuf, T., Mahmoud, R., Aloul, F., & Zualkernan, I. (2015). Internet of Things (IoT) Security:
Current Status, Challenges and Countermeasures. International Journal For Information
Security Research, 5(4), 608-616. http://dx.doi.org/10.20533/ijisr.2042.4639.2015.0070
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]