Problem on identification and tracking technologies


Assignment task:

Purpose:

IoT is becoming prevalent in a number of technology systems and scenarios. This assignment allows you to explore a single scenario in detail with regard to the security vulnerabilities present and the types of mitigation strategies that could be used in a specific scenario or system.

Assignment Instructions:

Choose one from the following broad scenarios/systems:

Identification and Tracking Technologies (RFID)

Health Care wearable recording devices worn by patients that transmit data back to a physician.

IoT use in Smart Cities

IoT use in Smart Homes

IoT in Automated Factories

IoT used in environmental monitoring.

You can discuss the broad scenario or select a specific type of device from within this type of system.

Apply the concepts learned in your reading and through research on the Internet to discuss security issues that are unique to the chosen system/scenario. Support what you discuss with specific examples.

For your chosen scenario, discuss security issues and threats in the following layers of the IoT:

  • perception layer
  • network layer
  • application layer
  • For your chosen scenario, discuss challenges related to:
  • Authentication
  • Authorization
  • Access Control (including physical access)

Recommend appropriate mitigation strategies for your chosen scenario.

Be sure to cite your sources and provide a reference list.

Assignment Requirements:

The paper should be 5-6 pages, use 12 pt. Times New Roman, and be in APA format.

Request for Solution File

Ask an Expert for Answer!!
Other Subject: Problem on identification and tracking technologies
Reference No:- TGS03430717

Expected delivery within 24 Hours