Purpose
IoT is becoming prevalent in a number of technology systems and scenarios. This assignment allows you to explore a single scenario in detail with regard to the security vulnerabilities present and the types of mitigation strategies that could be used in a specific scenario or system.
Assignment Instructions
Choose one from the following broad scenarios/systems:
Identification and Tracking Technologies (RFID)
Health Care wearable recording devices worn by patients that transmit data back to a physician.
IoT use in Smart Cities
IoT use in Smart Homes
IoT in Automated Factories
IoT used in environmental monitoring.
You can discuss the broad scenario or select a specific type of device from within this type of system.
Apply the concepts learned in your reading and through research on the Internet to discuss security issues that are unique to the chosen system/scenario. Support what you discuss with specific examples.
For your chosen scenario, discuss security issues and threats in the following layers of the IoT:
perception layer
network layer
application layer
For your chosen scenario, discuss challenges related to:
Authentication
Authorization
Access Control (including physical access)
Recommend appropriate mitigation strategies for your chosen scenario.
Be sure to cite your sources and provide a reference list.
Assignment Requirements
The paper should be 5–6 pages, use 12 pt. Times New Roman, and be in APA format.