Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave
IoT Innovate: IoT Security and Privacy Report

Functional Requirements of the Respective IoT Infrastructure

IoT Innovate is a leading IoT systems development and deployment company providing third party services in the UK. Due to the company’s good reputations, several projects have come in from a wide range of industrial sectors. Unlike previous contracts, clients are not only interested in system functionality, but require reasonable assurance that security and privacy considerations are inherent in design. As a member of the security team, you are responsible for proposing the IoT architecture and defining the security and privacy requirements for the project you select.

Note: A system “architecture” is a conceptual model or design that defines the structure, behaviour, and  views of a system. It consists of system components and the sub-systems that work together to implement the overall system. A “security and privacy” architecture is a unified design that addresses thepotential security and privacy risks involved in a certain scenario or environment it also specifies when and where to apply the required security and privacy controls.

Please select ANY ONE of the following topics to explore the current state of IoT security and privacy for your report:

  • A security and privacy architecture for COVID-19 contact and trace.
  • A security and privacy architecture for IoT fog computing in smart cities.
  • A security and privacy architecture for 5G networks.
  • A security and privacy architecture for smart public transport (e.g., busses, trains etc).
  • A security and privacy architecture for drone-based systems (e.g., drone package delivery, surveying etc).

Please prepare a 3000-word report with the following structure:

Section 1) Introduction (indicative length, 100 words): Introduce the research by defining the research area and scope.

Section 2) Functional requirements of the respective IoT infrastructure (indicative length, 350

words): Highlight and describe the functionalities to be present in the respective IoT infrastructure you considered.

Section 3) Technical security and privacy requirements (indicative length, 650 words): Describe the most critical security and privacy requirements (a subsection for each) that need to be present in the system you considered. Also, explain various standard ways of compromising such security and privacy

features.

This is an individual assignment which carries 100% of the final unit mark

Section 4) Associated and unique challenges (indicative length, 400 words): Identify the associated and unique challenges with this IoT infrastructure. In addition, you should mention how to deal with such challenges in order to develop a secure, efficient, scalable and privacy-preserving framework for the IoT infrastructure.

Section 5) State-of-art and proposed technologies to be used (indicative length, 650 words):

Describe different technologies available to use in the given IoT environment and recommend and justify suitable technologies to use. Your criticism and arguments should be supported by the literature.

Section 6) Overall security and privacy architecture (indicative length, 850 words): Aided by a diagram, present an overall security and privacy architecture of the system. This involves and integrated discussion of the chosen technology, techniques, network protocols etc, complemented by your opinion to inform an efficient, secure and privacy preserving IoT architecture. Note that the architecture is informed by your findings in the sections above.

This assignment tests your ability to:

  1. Illustrate a deep understanding of Security and Privacy of IoT-related networks and systems.
  2. Critically appraise cryptographic algorithms and protocols, security mechanisms, privacy enhancing technologies, trusted computing principles and standards of secure IoT-related networks and systems.
  3. Illustrate understanding and capability of producing security architectures of IoT-related networks and systems.
  4. Illustrate current knowledge and awareness of research activities on future and emerging paradigms of Security and Privacy in IoT-related technologies, networks and systems.

support
close