Assignment - IoT (MOD-5) Priyanka Singh

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Assignment

Name:- Priyanka Singh


ID:-191001109022
Year:- 3rd year

Q.1 What do you understand by Governance in IoT? State any two challenges
faced by governance in terms of privacy, security.

Ans.1 It is development and application by Governments, the private sector


and civil society, in their respective roles, of shared principles, norms, rules,
decision-making procedures, and programs that shape the evolution and use
of the Internet.
The challenges faced by governance in terms of privacy and security are as
follows:-

1.Context based security and privacy:- This section describes the challenge of
designing a security and privacy framework, which is able to address changes in
the context (e.g., emergency crisis) or context which do not support the collection
and processing of data from sensors.

For example, in a surveillance scenario, bad quality images may induce false
results of the “smart” functions implemented in IoT framework and hamper the
overall decision process in the algorithms used to ensure the security and trust of
the system (e.g., level of reputation).

2.Device authentication :- Most systems which bind IoT sensors and actuators
rely on some proxyconcept, i.e. sensors communicate to some more powerful
entity (e.g, from the processing and storage point of view) which then
authenticates the sensors on their behalf. However, the last mile effectively
remains unprotected which is a barrier to guaranteeing important security
properties such as non-repudiation.

‘Lightweight’ solutions are still an open issue for many devices. The long history
of research in sensor networks domain has not produced secure and low-cost
solutions feasible for most devices. Thus, new types of security primitives or
mechanisms which do not only focus on the higher layers in communication
protocols would be worthwhile to investigate.

Q.2 Discuss the significance of the name of FP7 as FP7. Precisely state the
contribution of FP7 project in IoT.

Ans.2 FP7 means 7th framework program for research and technological
development. It lasted for 7 years from 2007 until 2013. The objective of this
section is to provide a mapping of the deliverables of the FP7 projects to Ethics,
Governance, Security and Privacy;

CONTRIBUTION FROM FP7 Projects are as follows :-


 FP7 iCore access framework:- The iCore cognitive framework is based on
the principle that any real-world object and any digital object that is
available, accessible or controllable can have a representation in IoT.

 IoT at work capability-based access control system:


 A capability is a communicable, unforgivable rights makeup, which
corresponds to a value that uniquely specifies certain access rights to objects
owned by subjects.
 In CAP-BAC, the user needs to show the service provider the authorization
certificate prior to performing resources request operations.

 GAMBAS middleware:- GAMBAS means Generic Adaptive Middleware


for Behaviour driven Autonomous Service. GAMBAS middleware
simplifies the development of smart city supplication focusing to common
tasks, namely efficient data acquisition, secure and privacy-preserving data
as well as data integration.

 BUTLER project:- The goal of BUTLER project is the creation of an


experimental technical platform to support the development of IoT.

Q3. Define SMARTIE approach in terms in IoT. State the objectives of


SMARTIE approach in Internet of Thing.

Ans.3 SMARTIE Approach :- SMARTIE is used to design and build data-


centric information sharing platform.This information is accessed by an
information service layer.

The objectives of SMARTIE approach in Internet of Thing are as follows :-

1.Understanding requirements for data and application security and


creating a policy-enabled framework supporting data sharing
across applications.

2.Developing new technologies that establish trust and security in


perception layer and network layer.

3.Develop new technologies for trusted information creation and


secure storage for the information service layer.

4.Develop new technologies for information retrieval and


processing guided by access control policies in the application
layer.

5.Demonstrate the project results in real use cases.


Q.4 State any three use cases of BUTLER projects in internet of things.
What were the common tasks focused by the GAMBAS middleware for
development of smart cities? What were the focuses of BUTLER
project?

Ans.4 The use cases of BUTLER projects in internet of things are as


follows :-

I. The main of BUTLER project is the creation of an experimental


technical platform to support the development of the IoT.

II. The main achievement of BUTLER project is the release of the open-
platform portal on which IoT applications can be created.

III. The BUTLER project uses secure communication devices that are
adapted o the limited capacity of devices that are part of the network.

The GAMBAS middleware simplifies the


development of smart city application by focusing of
three common tasks:
1.Data acquisition
2.Secure data distribution and
3.Interoperable data integration

BUTLER focused on five innovative eco-system:


(b) Smart home and offices
(c) Smart shopping
(d) Smart transport
(e) Smart healthcare
(f) Smart cities

Q.5 What were the security requirements for all the layers used in
SMARTIE approach?
Ans.5 The security requirements for all the layers used in SMARTIE
approach are discuss in the following table.

IOT Layer Security Requirement


1. Application Layer 1.Privacy protection policy
management
2.Secure computation
3.Discovery of information
sources 4.Authentication,
authorization, assurance

2. Information Service a. Cryptographic data storage


Layer b. Protected data management and
handling

3.Network Layer a. Communication and


connectivity security
b. Secure sensor interaction.
c. Cross-domain data security
handling
4.Smart Object a. Data format and structures.
b. Access control to nodes.
c. Lightweight encryption.
d. Trust attestation.

You might also like