ICA SPECIFICATION
(Element 2)
Module Title: IoT Security |
Module Leader: Mohammad A. Razzaque |
Module Code: CIS4019-N | |
Assignment Title: A layer-wise component and security analysis of an IoT application |
Deadline Date: 13-01-2021 (Wednesday) |
Deadline Time: 4:00 pm | |
Submission Method: Online via Blackboard x TU Online Middlesbrough Tower x |
Online Submission Notes: • Please follow carefully the instructions given on the Assignment Specification • When Extenuating Circumstances (e.g. extension) has been granted, a fully completed and signed Extenuating Circumstances form must be submitted to the School Reception or emailed to scdtassessments@tees.ac.uk. Central Assignments Office (Middlesbrough Tower M2.08) Notes: • All work (including CDs, etc.) needs to be secured in a plastic envelope or a folder and clearly marked with the student name, number and module title. • An Assignment Front Sheet should be fully completed before the work is submitted. • When an extension has been granted, a fully completed and signed Extension form must be submitted to School Reception or emailed to scdtassessments@tees.ac.uk. |
FULL DETAILS OF THE ASSIGNMENT ARE ATTACHED
INCLUDING MARKING & GRADING CRITERIA
The Scenario
Your Tasks
IOT Security
Analysis of an IoT application in layered view, and security analysis of that application and
making a report of process (approx. 2000 words). This element (counts 50% of your overall
marks) will assess the learning outcomes 1, 4 and 7, which are as below:
1. Communicate clearly and professionally regarding technical issues in an IoT network
and security.
4. Demonstrate critical understanding of standard security and privacy preserving
mechanisms in IoT.
7. Discuss and make informed comments on emerging areas of the Internet of Things,
demonstrating an understanding of the social, environmental and commercial context.
CyberHealth Ltd. is a Teesside based cybersecurity solution provider, where you are working
as a cybersecurity expert. Your company provides Networking & Cybersecurity solutions for
the business environment. They currently offer managed, professional, and hardware &
software services. Recently, few companies have approached CyberHealth to offer them
services for their IoT solution clients. CyberHealth is interested in extending its business by
providing services to its customers who offer IoT solutions.
The use of telemedicine with the support IoT has increased globally due to COVID-19. Your
company is more interested in healthcare-related IoT solution providers or customers. In this
context, you are assigned to analyse the security of an existing remote monitoring system
(offered by an IoT solution provider) for elderly and chronic disease patients.
Task 1 (T1): Discuss the three- and five-layered architecture of the IoT-based remote
patient monitoring system (e.g., fall detection and reporting or any app selected from
Google’s play or Apple’ Apps store) (20%). For the task you need to include:
• A diagram of the architecture
• Brief description of each layer (e.g., sensing or perception) with their
components (e.g., specific sensor or sensors).
Task 2 (T2): Select one of the two IoT architectures mentioned above and justify your
selection, especially from the perspective of cyber security (10% mark).
Advice and Assistance
Deliverable and deadline
Assessment criteria
Task 3 (T3): Explain with examples how you would analyse the E2E security concerns (using
the selected architecture in task 2 and its layer-wise components) of the selected solution
(40% mark). For this task, be precise about tools and methods. Justify all your decisions.
Task 4 (T4): Discuss countermeasures for the identified security concerns of the sensing (in
task 3) layer of the selected patient monitoring system (10%).
Task 5 (T5): Discuss and make informed comments on emerging applications of IoT in
healthcare, demonstrating an understanding of the social and commercial context (10%
mark).
Task 6 (T6): Write the report clearly and professionally (i.e., using reference) regarding
technical issues in an IoT network and security (10% mark).
You should submit your report as a PDF document via online (Blackboard) by the 13 January
2021 (Wednesday) (16:00PM).
For feedback and advice on your progress consult the module tutors during the scheduled
sessions. In addition, you can email both tutors
(m.razzaque@tees.ac.uk/u.adeel@tees.ac.uk).
The tasks T1-T4 cover the learning outcome 4 (total 80% mark), task T5 covers learning
outcome 7, and task T6 covers learning outcome 1.
Marks will be assigned as in the following table.
Task | 70%+ | 60-69% | 50-59% | 40-49% |
1 | An excellent discussion about the three- and five-layered view or architecture of the selected IoT application, including a diagram of each architecture. |
A good discussion about the three- and five-layered view or architecture of the selected IoT application, including a diagram of each architecture. |
A fair discussion about the three- and five-layered view or architecture of the selected IoT application, including a diagram of each architecture. |
A limited discussion about the three- and five-layered view or architecture of the selected IoT application. Diagrams are missing. |
2 | An excellent answer with excellent justification. |
A good answer with appropriate justification. |
A fair answer with fair justification. |
A limited answer with limited justification. |
3 | An excellent analysis (with examples) of E2E security concerns of the selected architecture of the solution. Appropriate tools and methods are used with excellent justification. |
A good analysis (with examples) of E2E security concerns of the selected architecture of the solution. Appropriate tools and methods are used with justification. |
A fair analysis (without examples) of E2E security concerns of the selected architecture of the solution. Tools and methods are used with limited justification. |
A limited analysis (without examples) of E2E security concerns of the selected architecture of the solution. Tools and methods are used without justification. |
4 | An excellent discussion about countermeasures for the identified security concerns of the sensing layer. |
A good discussion about countermeasures for the identified security concerns of the sensing layer. |
A fair discussion about countermeasures for the identified security concerns of the sensing layer. |
A limited discussion about countermeasures for the identified security concerns of the sensing layer. |
5 | An excellent discussion and informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context |
A good discussion and informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context. |
A fair discussion and some informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context. |
A limited answer and few informed comments on emerging applications of IoT in healthcare, demonstrating an understanding of the social and commercial context |
6 | A very clear and readable report, with excellent structuring, good use of grammar and referencing. |
A clear and readable report, with good structuring, good use of grammar and referencing. |
The report is readable but with minor errors. Some use of relevant source material and referencing. |
A readable report, with major errors in writing, structure or referencing. |
For more information, please contact tutor or module leader.