Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Submission: Submit project report on Moodle. Demonstrations of the project will be conducted during week 12. Task Details: The tutor will form the group

image text in transcribed

Submission: Submit project report on Moodle. Demonstrations of the project will be conducted during week 12. Task Details: The tutor will form the group with 3-4 students. Groups are required to research about loT applications and write down the literature review summary of those applications. The literature must be either journal articles or conference papers. Groups will choose an IoT application to develop for their project. The requirements of the chosen loT application must be approved by the tutor in week 3. Group will also analyse security and privacy issues related to the proposed application using the modelling techniques learned in the subject. Furthermore, the groups are required to suggest counter solutions for secure the application The project report must be more than 3000 words and must use the provided group report template. The group report template is provided in the Moodle. The individual report must include four main parts: 1. Class demonstration and presentation 2. Activity/meeting log 3. Contribution description 4. Individual reflection journal: reflections on the team collaborations, problems, solutions and lesion learnt The project report must include at least the following sections: Table of Content: An autografted ToC should be included with heading and subheadings Literature review summary of IoT applications Executive Summary: an executive summary highlights the design, analysis, and conclusions Introduction: introduction of the loT application and its requirements Design and development: complete design of the application based on the requirements with detailed system and application architecture. The development is carried out in Cooja. The details of the implementations and the results are discussed Security Issues: analyse and discuss all related security concerns of the loT application using threads modelling techniques Security solutions: propose and justify solutions for the security issues Conclusion: provide a summary and recommendations Reference Appendix individual contributions

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction to Wireless and Mobile Systems

Authors: Dharma P. Agrawal, Qing An Zeng

4th edition

1305087135, 978-1305087132, 9781305259621, 1305259629, 9781305537910 , 978-130508713

More Books

Students also viewed these Programming questions

Question

Evaluate the binomial coefficient. 8.

Answered: 1 week ago

Question

Find the inverse, if it exists, for the matrix. -1

Answered: 1 week ago