Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Submission: Submit project report on Moodle. Demonstrations of the project will be conducted during week 12. Task Details: The tutor will form the group
Submission: Submit project report on Moodle. Demonstrations of the project will be conducted during week 12. Task Details: The tutor will form the group with 3-4 students. Groups are required to research about loT applications and write down the literature review summary of those applications. The literature must be either journal articles or conference papers. Groups will choose an IoT application to develop for their project. The requirements of the chosen loT application must be approved by the tutor in week 3. Group will also analyse security and privacy issues related to the proposed application using the modelling techniques learned in the subject. Furthermore, the groups are required to suggest counter solutions for secure the application The project report must be more than 3000 words and must use the provided group report template. The group report template is provided in the Moodle. The individual report must include four main parts: 1. Class demonstration and presentation 2. Activity/meeting log 3. Contribution description 4. Individual reflection journal: reflections on the team collaborations, problems, solutions and lesion learnt The project report must include at least the following sections: Table of Content: An autografted ToC should be included with heading and subheadings Literature review summary of IoT applications Executive Summary: an executive summary highlights the design, analysis, and conclusions Introduction: introduction of the loT application and its requirements Design and development: complete design of the application based on the requirements with detailed system and application architecture. The development is carried out in Cooja. The details of the implementations and the results are discussed Security Issues: analyse and discuss all related security concerns of the loT application using threads modelling techniques Security solutions: propose and justify solutions for the security issues Conclusion: provide a summary and recommendations Reference Appendix individual contributions
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started