5/16/2020 S-ITC560_202030_SM_I @CSU https://interact2.csu.edu.au/webapps/csu-serviceslink-BB5c1c4db3261aa/link?type=msi&course_id=_45729_1&mode=view 1/4 Choose one of the topics given below and submit...

1 answer below »
attached


5/16/2020 S-ITC560_202030_SM_I @CSU https://interact2.csu.edu.au/webapps/csu-serviceslink-BB5c1c4db3261aa/link?type=msi&course_id=_45729_1&mode=view 1/4 Choose one of the topics given below and submit a research project, which should not exceed 4000 words. The ITC560 Assign3 Help File Template.doc is available in the Student Resources Folder on Interact2. Topics to select from but not limited to are: IoT for Sustainability IoT Devices and Next Generation Manufacturing IoT Revenue Model Challenges IoT in the Automotive Industry IoT in the Mining Industry IoT for Independent Living of the Older Generation IoT for Reducing Food Wastage in Australia IoT in Finance Industry and Security Challenges Machine Learning in IoT Future of the Fog Domain IoT and Data Analytics Big Data Challenges in IoT and Cloud M2M Connectivity Architectures for Remote & Rural Areas Utilising Block Chain Technology in IoT IoT in Healthcare Security Challenges of IoT in Healthcare IoT for Smart Learning/Education Fog Computing in 5G Security Challenges of Fog Computing IoT Device Security Energy Efficient Routing Protocols for IoT If you think of any other related topics please talk to your lecturer before deciding. The use of a Research Report from this or another subject, even if it is your own, is considered Academic Misconduct. This report must be your own original work for this subject in this session. For the Topic you select, you are to prepare a research report, outlining your response to the question using the literature to strengthen your case. In order to complete this task it is recommended that: 1. Analyse the Task (Milestone 1: Should be completed by end of Week 5) Analyse what is expected of you. This includes careful reading of the assignment task as specified in the Subject Outline. Look at the literature and start collecting at least 10 Journal Articles and/or Conference Papers. For Analysis: i) What is the purpose of this report? ii) What is your position on the topic? iii) What is the expected format of the report? (Refer to the format in Interact2 Student Resources: ITC560 Assign3 Help File Template.doc). iv) Come up with a Problem Statement based on your topic, note it down and discuss it with your lecturer. 2. Do the Research: Literature Review (Milestone 2: Should be completed by the end of Week 8) This is the main part of the research project and could take more time. i) Review of Literature based on past and current work in your topic (download from conference 5/16/2020 S-ITC560_202030_SM_I @CSU https://interact2.csu.edu.au/webapps/csu-serviceslink-BB5c1c4db3261aa/link?type=msi&course_id=_45729_1&mode=view 2/4 proceedings, journal articles - use Primo search to access more articles and journals - Minimum of 10 journals or articles) ii) Structure in chronological order and start summarising. iii) Use the literature to formulate an argument supported by evidence. 3. Final Report (Milestone 3: Submission Due Week 11) NB if you ask for an extension, you will be required to submit the material for the above milestones first. Start writing your draft, as you do your research project (Put it all together) i) Use the ITC560 Assign3 Help File Template.doc provided in the Student Resources section. Your Report MUST use this format. ii) Write the Abstract of the report (Purpose, Scope, Position, Observations, Rationale and Conclusion) iii) Modify the Introduction from Milestone 1 if necessary iv) Modify the Review of Literature from Milestone 2 if required, based on past and current work in your topic (no more than 3 pages) v) Include tables and graphs to support your justification and argument. vi) Discuss your research findings with a conclusion. vii) Referencing MUST be in CSU APA7 format (this is the new version), using in-text citations (see https://student.csu.edu.au/library/integrity/referencing-at-csu for guidelines and help). RATIONALE SUBJECT LEARNING OUTCOMES This assessment task will assess the following learning outcome/s: be able to explain and demonstrate various components of Internet of Things (IoT). be able to analyse the role and importance of IoT in the modern world. be able to investigate and propose various requirements of IoT for real world applications. be able to evaluate a variety of existing and developing architecture technologies for IoT. be able to describe and evaluate different applications of the IoT. GRADUATE LEARNING OUTCOMES This task also contributes to the assessment of the following CSU Graduate Learning Outcome/s: Academic Literacy and Numeracy (Application) - Charles Sturt Graduates consider the context, purpose, and audience when gathering, interpreting, constructing, and presenting information. Information and Research Literacies (Knowledge) - Charles Sturt Graduates demonstrate that disciplinary knowledge is developed through research and evidence. Information and Research Literacies (Skill) - Charles Sturt Graduates demonstrate the skills required to locate, access and critically evaluate existing information and data. Information and Research Literacies (Application) - Charles Sturt Graduates synthesize and apply information and data to different contexts to facilitate planning, problem solving and decision making. Ethics (Application) - Charles Sturt Graduates form judgements and apply ethical decision making and reasoning to identify creative solutions to ethical problems. MARKING CRITERIA AND STANDARDS Criteria HD DI CR PS Abstract (10 Mark) Comprehensive and precise Thorough and clear description of the Abstract Moderate but clear description of the Abstract Most of the parts of Abstract https://student.csu.edu.au/library/integrity/referencing-at-csu https://student.csu.edu.au/study/glo 5/16/2020 S-ITC560_202030_SM_I @CSU https://interact2.csu.edu.au/webapps/csu-serviceslink-BB5c1c4db3261aa/link?type=msi&course_id=_45729_1&mode=view 3/4 description of the Abstract included but some not clear Introduction (15 Mark) Thorough explanation of the topics Good explanation of the methodologies Moderate explanation of the methodologies Superficial explanation of the methodologies Literature Review (20 Mark) Thorough and comprehensive research including a minimum of 10 journals and conference papers Good research of a minimum 10 journal and conference papers Moderate research of a minimum of 10 journal and conference papers Superficial research of a minimum of 10 journal and conference papers but not complete Methodologies (10 Mark) Choice of the best methodology to suit the problem Good methodology to suit the problem Methodology to suit the problem Methodology to suit the problem but incomplete Comparison of Methodologies (10 Mark) Thorough comparisons of the background topic with minimum 5 parameters Good comparisons of the background topic with minimum 5 parameters Some comparison of the background topic with minimum 5 parameters Few comparisons of the background topic with few parameters Problem Solution or Recommendations or Findings (15 Mark) Solution of the problem explained thoroughly Solution of the problem explained well Solution of the problem explained Solution of the problem explained incompletely Conclusion & Future Research (10 Mark) Succinct conclusion of the report (no new information), including possible future research Succinct conclusion of the report (no new information), including possible future research Succinct conclusion of the report (no new information), including possible future research Vague conclusion of the report, and/or no possible future research Referencing and Presentation (10 Mark) All sections include the APA7 style referencing with in-text citations. Correct styles and presentation following the provided ITC560 Assign3 Help File Template.doc Most sections include the APA7 style referencing with in-text citations. Correct styles and presentation following the provided ITC560 Assign3 Help File Template.doc Enough sections include the APA7 style referencing with in-text citations. Correct styles and presentation following the provided ITC560 Assign3 Help File Template.docCorrect styles and presentation following the provided ITC560 Assign3 Help File Template.doc Some sections include the APA6 style referencing with in-text citations missing. Poorly followed the styles and presentation provided in the ITC560 Assign3 Help File Template.doc 5/16/2020 S-ITC560_202030_SM_I @CSU https://interact2.csu.edu.au/webapps/csu-serviceslink-BB5c1c4db3261aa/link?type=msi&course_id=_45729_1&mode=view 4/4 PRESENTATION Your assessment should be a maximum of 4000 words (±10%) and submitted in either MS Word or PDF format (PDF usually preserves the formatting, MS Word may not - submit ONLY one version). Do not submit your assignment in any other format and also do not submit multiple copies of the assessment. Use A4 page size with Times New Roman/Arial/Calibri font and use font size 11 or 12. Please include a title, your student ID, your name and word count as the first page with your submission. The word count does not include Tables, Figures or reference list. Your name should also be included as a footer, with page numbers in your document. All textual elements within an assessment must be submitted in a format that is readable by Turnitin. Specific exceptions, where an assessment requires the insertion of image based evidence of workings will be outlined in the context of the assessment. Students that deliberately attempt to insert content of assessments in a format that is not readable by Turnitin may be subject to Academic Misconduct investigations. References: You MUST use the CSU APA6 referencing style for all cited material you have used in your work (use in-text citations). You must use primary sources (ie Wikipedia is NOT acceptable, something you thought up yourself because you think you know better, is also unacceptable - unless it has been published and peer reviewed, but then it would still need to be cited). Do not use direct quotes from sources, all your work must be written in your own words. Copying sections of text from other sources, even if referenced, is plagiarism and is considered Academic Misconduct. REQUIREMENTS To complete this assessment item you should have read chapters 1 to 10 of the textbook and examined relevant literature from the Library and Internet.
Answered Same DayMay 16, 2021ITC560Charles Sturt University

Answer To: 5/16/2020 S-ITC560_202030_SM_I @CSU...

Deepti answered on May 24 2021
151 Votes
IoT: Device Security in Wearable Devices
Abstract
Analysis of privacy and security issues of wearable Inter of Things (IoT) devices is a complicated task. The current system strives to innovate mechanisms that address these major concerns in this upcoming field of technology. As the interaction among users and wearable IoT is increasing, private information is vulnerable to be accessed due to several factors including lack of privacy protections. It is challenging to address privacy and security of information in these devices due to limited capabilities and design. These low processing devices initially aimed at facilitating ease of access to the controlling devices that they interconnect with. Their scope of use increased with inventions (Thierer, 2015)
in wearable computing and data monitoring. This IoT technology has not evolved in terms of privacy and security acceptance of the users. The devices are small in size for convenience and portability thus consume less power leading to low processing. This further leads to limited ability to be equipped with robust security mechanisms. In this paper, we review literature on security of wearable IoT devices where the vulnerabilities of the technology are highlighted along with the risks they pose to the user while using the device. We further discuss the security weaknesses that make the wearable devices vulnerable to attacks and loss of data. A comprehensive overview on security and privacy issues is presented.
Keywords: IoT, wearables, wearable IoT, privacy, security, vulnerabilities, risks, challenges, cyberattacks
1. INTRODUCTION
Internet of things is a worldwide environment which interconnects different type of things to the internet anywhere anytime. The application domains of the Internet of Things vary from device to device, device to people and people to people. IoT connectivity enables the devices to collect, exchange and transport data through internet which may be monitored and controlled remotely. With the growth in IoT, large volumes of data are added to networks, data processing, storage and analysis. One of the easier ways to collect, monitor and control this data is through wearable IoT. This technology is fast catching up as it is part of every discussion on IoT and opens door to a full range of new functionalities pervasive connectivity can offer. Smart wearable technology includes its uses in various fields like health care, education and research. One of the main functions delivered by IoT wearables is to provide identification and security. For example, RFID badges. Some of the wearables offer security features like biometric capabilities and measurements. All such devices use another device as a central control for delivering those capabilities. The devices can be automatically connected to the controlling devices using a communication strategy set with an interface.
Wearable IoT devices can be used to monitor the well-being, quality and progress of life of its user. The characteristics that define these devices are controllable, monopolizing, attentive, observable unrestrictive and communicative. The technology continues to evolve exponentially and has achieved in communicating with remote devices involving big data using internet which is omnipresent and cloud computing which is on the verge of becoming omnipresent. This combination of big data, IoT and smart wearable devices created an opportunity to monitor activities and store sensitive information about the user of the device. These wearable devices are carried on the body or integrated with accessories or garments. The wearable technology brings a myriad of benefits to human life. It offers improvement in human life professionally as well as personally. They have sensors plugged in to monitor and track the user’s needs like health monitoring, financial information (although in small quantity but confidential), etc. They are also used in areas like education, music, finance and entertainment. Nevertheless, it brings along risks too. The effects of using this technology are seen when it shows limited capacity of working according to expectations. The interconnection of these devices with other controlling devices like user’s smartphone over wireless channels (Snader, 2016) or internet leads to substantial challenge of exposing data to unauthorized person or leaking personal data.
The paper discusses the vulnerabilities identified in wearable technology and the security challenges due to those vulnerabilities. It briefly discusses the issues related to the uses of those intelligent wearables and the risks involved in using them and finally concludes the flaw majorly responsible for these issues from the studied literature. The review concludes with a discussion on future research.
2. LITERATURE REVIEW
Wearable IoT have broaden and improved the perspective of individuals about their surroundings. A successful IoT device has to be affordable as well as reliable. It should not interfere with other devices and should incorporate mechanisms to remain immune from interferences. It should further ensure effective battery life with perfect functionality and energy efficiency. However, the risks involved in attaining this ideal scenario are many.
IoT include a plethora of devices or things like vehicles, smartphones, televisions, wearable devices like fitness tracking devices, smartwatch and Google Glass, etc. These devices are embedded with software applications, sensors and other components for receiving and sending data. A colossus of connected devices is created by inter-connectivity of those devices. This connectivity offers magnificent benefits to people’s lives but it entails certain security and privacy concerns. The most conspicuous among them are the wearable devices which are gaining widespread acceptance among general population. Wearable IoT include smartwatches, smart glasses, fitness trackers to name a few. The wearable IoT devices offer convenience and great deal of comfort to the user. They sense, translate, collect and prepare data for transmission to remote storage in order to be processed. However, this technology has not entered the daily lives due to reasons of its reliability, limited functionality and feasibility. It entails certain security and privacy vulnerabilities and issues for which literature is reviewed in this paper. These security and privacy related issues are subject to device access, access to information shared by the device with other controlling or non-controlling devices and access to information stored in cloud by transmitting it from the IoT device. Research in recognizing potential privacy and security risks delve into the issue for analysis. However (Snader, 2016) states that the solutions identified for addressing these issues may hamper with the ability of the device to connect with its controlling device. Certain other constraints like power consumption and computation constraints lead to unencrypted and insecure data transmission.
2.1. VULNERABILITIES
The literature by Ching and Singh in (Ching, 2016) illustrates the utility of various wearable devices like fit bit, google glass and smart watch. (Lee, 2015) perceived and analyzed the risks for wearable IoT devices. A security analysis on real world examples revealed the vulnerabilities of wearables with regard to privacy and security. This includes photo bombing and scanning of malicious QR code thus unknowingly rendering access to malicious sources and websites or even recording of videos without consent using a wearable. Other wearable devices showed security vulnerabilities in terms of authentication as stated...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here