Professional Documents
Culture Documents
Questions
Questions
5-"What do the 'As' and 'Cs' stand for in the context of the Internet of Things
(IoT) as shown in the diagram?
6- Can you draw the evolution of the Internet from static and dynamic content
generation to the Internet of Things (IoT) ?
9- shows Draw parking information, traffic density, driver behavior, etc.) from
vehicles to vehicular Cloud through gateways in IoT and Smart Mobility
11- shows Draw of IoT-based smart home framework. Source: Based on
Stojkoska and Trivodaliev
12- shows Draw the use of different com munication technologies from
renewable energy resources to data centers.
13- What are the five stages in the IoT value proposition?
The five stages include creating data, communicating data, collecting data, analyzing data, and acting
on the data.
15- What event contributed to the definition of the term "Internet of Things,"
and who promoted it?
The term "Internet of Things" was coined by Kevin Ashton during his work on Radio Frequency
Identification (RFID) infrastructure at the Auto-ID Center of Massachusetts Institute of Technology
(MIT) in 1999.
17- What are the main application domains of Internet of Things (IoT)
according to the provided text?
The main application domains of Internet of Things (IoT) are smart transportation, smart agriculture,
and other various environments.
18- How is a smart home defined and what are its intended benefits according
to the text?
A smart home is defined as digitally engineered domestic life using IoT technologies to anticipate and
respond to residents' needs by providing comfort, convenience, security, and more.
22- Explain the concept of a smart city and its significance in urban
development.
A smart city integrates various IoT applications to manage public resources and services efficiently
while enhancing citizens' quality of life. It utilizes information and computing technologies to establish
infrastructure components and services in a more intelligent and effective way. Smart cities aim to
optimize resource usage, enhance public safety, and provide quality services at reduced costs,
ultimately improving urban living standards.
23- Explain the concept of Industrial Internet of Things (IIoT) and discuss its
applications in manufacturing industries.
- IIoT involves the interconnectivity of sensors and instruments with computing applications in
manufacturing industries. It enables monitoring of industrial plants to prevent machinery failures and
enhance efficiency. IIoT applications include smart factory warehousing, logistics monitoring, energy
optimization, security alarm systems, and automation of production lines. Despite its benefits, IIoT
faces challenges such as integration with legacy technology, lack of standardization, and high
implementation costs.
25- What makes securing IoT systems different from securing traditional
networks?
The implementation of security mechanisms in IoT systems is more challenging than in conventional
wired and wireless networks.
28-IoT systems face two main types of security threats. State these types and
provide an example for each.
threats against IoT:
a) IP camera hacking through buffer overflow attacks
b) A Distributed Denial of Service (DDoS) attack on Dyn Servers
c) Botnet attack to hack IoT devices
d) SQL injection attacks
Software Limitations: Robust communication protocol stack and dynamic security patches are
difficult to be implemented on thin embedded operating systems installed on IoT sensing devices.
31- How can tampering with sensor data be harmful in an IoT application?
Tampering with sensor data can disrupt the entire system. For example, if a temperature sensor in a
greenhouse sends incorrect readings, it could lead to overheating and damage crops.
33- How does access control differ from authorization in an IoT system?
Authorization defines the overall access permissions for users or devices within the system. Access
control builds on that by enforcing those permissions on specific resources. Think of authorization as
setting general user roles, and access control as defining which files each role can access.
35- How can achieving interoperability in security create challenges for IoT
systems?
While interoperability is important for different devices to work together, it can be difficult to ensure
all devices support the same security protocols. This can create vulnerabilities if some devices have
weaker security measures.