Professional Documents
Culture Documents
Assignment - IoT (MOD-5) Priyanka Singh
Assignment - IoT (MOD-5) Priyanka Singh
Assignment - IoT (MOD-5) Priyanka Singh
Q.1 What do you understand by Governance in IoT? State any two challenges
faced by governance in terms of privacy, security.
1.Context based security and privacy:- This section describes the challenge of
designing a security and privacy framework, which is able to address changes in
the context (e.g., emergency crisis) or context which do not support the collection
and processing of data from sensors.
For example, in a surveillance scenario, bad quality images may induce false
results of the “smart” functions implemented in IoT framework and hamper the
overall decision process in the algorithms used to ensure the security and trust of
the system (e.g., level of reputation).
2.Device authentication :- Most systems which bind IoT sensors and actuators
rely on some proxyconcept, i.e. sensors communicate to some more powerful
entity (e.g, from the processing and storage point of view) which then
authenticates the sensors on their behalf. However, the last mile effectively
remains unprotected which is a barrier to guaranteeing important security
properties such as non-repudiation.
‘Lightweight’ solutions are still an open issue for many devices. The long history
of research in sensor networks domain has not produced secure and low-cost
solutions feasible for most devices. Thus, new types of security primitives or
mechanisms which do not only focus on the higher layers in communication
protocols would be worthwhile to investigate.
Q.2 Discuss the significance of the name of FP7 as FP7. Precisely state the
contribution of FP7 project in IoT.
Ans.2 FP7 means 7th framework program for research and technological
development. It lasted for 7 years from 2007 until 2013. The objective of this
section is to provide a mapping of the deliverables of the FP7 projects to Ethics,
Governance, Security and Privacy;
II. The main achievement of BUTLER project is the release of the open-
platform portal on which IoT applications can be created.
III. The BUTLER project uses secure communication devices that are
adapted o the limited capacity of devices that are part of the network.
Q.5 What were the security requirements for all the layers used in
SMARTIE approach?
Ans.5 The security requirements for all the layers used in SMARTIE
approach are discuss in the following table.