CIS4019-N IoT Security

ICA SPECIFICATION
(Element 2)

Module Title:
IoT Security
Module Leader:
Mohammad A. Razzaque
Module Code: CIS4019-N
Assignment Title:
A layer-wise component and security
analysis of an IoT application
Deadline Date:
13-01-2021 (Wednesday)
Deadline Time: 4:00 pm
Submission Method:
Online via Blackboard x
TU Online
Middlesbrough Tower
x
Online Submission Notes:
• Please follow carefully the instructions given on the Assignment Specification
• When Extenuating Circumstances (e.g. extension) has been granted, a fully completed and signed
Extenuating Circumstances form must be submitted to the School Reception or emailed to
scdtassessments@tees.ac.uk.
Central Assignments Office (Middlesbrough Tower M2.08) Notes:
• All work (including CDs, etc.) needs to be secured in a plastic envelope or a folder and clearly marked
with the student name, number and module title.
• An Assignment Front Sheet should be fully completed before the work is submitted.
• When an extension has been granted, a fully completed and signed Extension form must be submitted to
School Reception or emailed to scdtassessments@tees.ac.uk.

FULL DETAILS OF THE ASSIGNMENT ARE ATTACHED
INCLUDING MARKING & GRADING CRITERIA

The Scenario
Your Tasks
IOT Security
Analysis of an IoT application in layered view, and security analysis of that application and
making a report of process (approx. 2000 words). This element (counts 50% of your overall
marks) will assess the learning outcomes 1, 4 and 7, which are as below:
1. Communicate clearly and professionally regarding technical issues in an IoT network
and security.
4. Demonstrate critical understanding of standard security and privacy preserving
mechanisms in IoT.
7. Discuss and make informed comments on emerging areas of the Internet of Things,
demonstrating an understanding of the social, environmental and commercial context.
CyberHealth Ltd. is a Teesside based cybersecurity solution provider, where you are working
as a cybersecurity expert. Your company provides Networking & Cybersecurity solutions for
the business environment. They currently offer managed, professional, and hardware &
software services. Recently, few companies have approached CyberHealth to offer them
services for their IoT solution clients. CyberHealth is interested in extending its business by
providing services to its customers who offer IoT solutions.
The use of telemedicine with the support IoT has increased globally due to COVID-19. Your
company is more interested in healthcare-related IoT solution providers or customers. In this
context, you are assigned to analyse the security of an existing remote monitoring system
(offered by an IoT solution provider) for elderly and chronic disease patients.
Task 1 (T1): Discuss the three- and five-layered architecture of the IoT-based remote
patient monitoring system (e.g., fall detection and reporting or any app selected from
Google’s play or Apple’ Apps store) (20%). For the task you need to include:
• A diagram of the architecture
• Brief description of each layer (e.g., sensing or perception) with their
components (e.g., specific sensor or sensors).
Task 2 (T2): Select one of the two IoT architectures mentioned above and justify your
selection, especially from the perspective of cyber security (10% mark).
Advice and Assistance
Deliverable and deadline
Assessment criteria
Task 3 (T3): Explain with examples how you would analyse the E2E security concerns (using
the selected architecture in task 2 and its layer-wise components) of the selected solution
(40% mark). For this task, be precise about tools and methods. Justify all your decisions.
Task 4 (T4): Discuss countermeasures for the identified security concerns of the sensing (in
task 3) layer of the selected patient monitoring system (10%).
Task 5 (T5): Discuss and make informed comments on emerging applications of IoT in
healthcare, demonstrating an understanding of the social and commercial context (10%
mark).
Task 6 (T6): Write the report clearly and professionally (i.e., using reference) regarding
technical issues in an IoT network and security (10% mark).
You should submit your report as a PDF document via online (Blackboard) by the 13 January
2021 (Wednesday) (16:00PM).
For feedback and advice on your progress consult the module tutors during the scheduled
sessions. In addition, you can email both tutors
(m.razzaque@tees.ac.uk/u.adeel@tees.ac.uk).
The tasks T1-T4 cover the learning outcome 4 (total 80% mark), task T5 covers learning
outcome 7, and task T6 covers learning outcome 1.
Marks will be assigned as in the following table.

Task 70%+ 60-69% 50-59% 40-49%
1 An excellent discussion
about the three- and
five-layered view or
architecture of the
selected IoT
application, including a
diagram of each
architecture.
A good discussion
about the three- and
five-layered view or
architecture of the
selected IoT
application, including a
diagram of each
architecture.
A fair discussion
about the three- and
five-layered view or
architecture of the
selected IoT
application, including
a diagram of each
architecture.
A limited discussion
about the three- and
five-layered view or
architecture of the
selected IoT
application. Diagrams
are missing.
2 An excellent answer
with excellent
justification.
A good answer with
appropriate
justification.
A fair answer with
fair justification.
A limited answer with
limited justification.
3 An excellent analysis
(with examples) of E2E
security concerns of
the selected
architecture of the
solution. Appropriate
tools and methods are
used with excellent
justification.
A good analysis (with
examples) of E2E
security concerns of
the selected
architecture of the
solution. Appropriate
tools and methods are
used with justification.
A fair analysis
(without examples)
of E2E security
concerns of the
selected architecture
of the solution. Tools
and methods are
used with limited
justification.
A limited analysis
(without examples) of
E2E security concerns
of the selected
architecture of the
solution. Tools and
methods are used
without justification.
4 An excellent discussion
about
countermeasures for
the identified security
concerns of the
sensing layer.
A good discussion
about
countermeasures for
the identified security
concerns of the
sensing layer.
A fair discussion
about
countermeasures for
the identified
security concerns of
the sensing layer.
A limited discussion
about
countermeasures for
the identified security
concerns of the
sensing layer.
5 An excellent discussion
and informed
comments on
emerging applications
of IoT in healthcare,
demonstrating an
understanding of the
social and commercial
context
A good discussion and
informed comments
on emerging
applications of IoT in
healthcare,
demonstrating an
understanding of the
social and commercial
context.
A fair discussion and
some informed
comments on
emerging
applications of IoT in
healthcare,
demonstrating an
understanding of the
social and
commercial context.
A limited answer and
few informed
comments on
emerging applications
of IoT in healthcare,
demonstrating an
understanding of the
social and commercial
context
6 A very clear and
readable report, with
excellent structuring,
good use of grammar
and referencing.
A clear and readable
report, with good
structuring, good use
of grammar and
referencing.
The report is
readable but with
minor errors. Some
use of relevant
source material and
referencing.
A readable report,
with major errors in
writing, structure or
referencing.

For more information, please contact tutor or module leader.

WhatsApp
Hello! Need help with your assignments?

For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

🛡️ Worried About Plagiarism? Run a Free Turnitin Check Today!
Get peace of mind with a 100% AI-Free Report and expert editing assistance.

X