0% found this document useful (0 votes)
35 views6 pages

Lab 01 - IOT Design

Uploaded by

amatory.slants0a
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views6 pages

Lab 01 - IOT Design

Uploaded by

amatory.slants0a
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

420-N35-LA: IOT I

Lab 1 – IOT Process Design


Due date: Please see your Lea for the due date.

Description and Purpose


This is a non-technical lab which is geared towards understanding the design process engineers are faced with
before creating the actual IOT devices.

The design process usually starts out with user requirements to capture what the user really needs. After that,
more detailed processes are designed to map how data is recognized, processed, and reported back (and
processed).

For this lab, students are expected to work in groups of 2 or 3.

Learning Objective(s)
1. Design a general use-case.
2. Design specific use-cases for important cases.
3. Design an activity diagram.

Steps
PART 1 – General Use Cases
Step 1
Read the following scenario:

A new IoT system is to be created to increase the chances for elderly people to be able to live at home
independently and safely.

The system has the following functions:

Medical:

 Monitors worn by the customers scan and measure basic and vital values such as heartbeat and
temperature.
 These values are stored in memory, and every hour they are uploaded into a central database
maintained by your company.
 If the person is not near Wi-Fi, it will store the data locally and upload next time it sees Wi-Fi.
 If the values appear to be above or below normal values – the system sends an urgent email to a doctor.
Also, the device can detect things such as falls and loud noises.
 In normal circumstances, the recorded data is sent as an Excel file to the doctor’s email as an
attachment. (In this case, try to think about who or what sends the email… is it the device? Remember
devices have low computational ability).

Step 2
(5 points) Construct a use-case generalized diagram based on the text above. Use an electronic diagramming
software such as Visio, Draw.io, Lucid Chart or Gliffy. You can draw the diagram by hand at first, but you must
translate it into digital form before pasting the result. Try to determine who the actors are in this scenario and

Date revised: 2022-09-02 (v2)


Lab 1 – IOT Process Design Page

try to look at the situation from the perspective of each of the actors. Your company is considered an actor also
(or the database program hosted by your company).

Try to be as complete as possible. Paste your use-case diagram here.

PART 2 – Detailed Use Case


Step 1
(5 points) Choose one use case from the general diagram (a bubble). Write a detailed use-case about this
scenario listing all required information such as pre-conditions, steps, alternative steps, and exceptions. Again,
please be as detailed as possible and try to use your imagination to find exceptions that you might not think
about normally.

Sending data to doctor based on situation:


The system will retrieve the data from a database. Then it will analyze it and, in parallel, it will create an
email. It will then attach the relevant information based on the analysis results: If the data is within the
“usual” values, it will be saved in an Excel file and attached to the email. If "unusual" data is detected, an
emergency message will be written to the email and sent immediately to the doctor.

Step 2
(5 points) Do the same as step one but choose a second use-case.

Uploading data collected locally to database:


Every hour, the device holding the information will upload the data that is collected to the database
maintained by the company. If the process of uploading is not possible due to not being connected to the
internet, the device will keep storing the information locally and upload it once connected to a network.
Lab 1 – IOT Process Design Page

PART 3 – Activity Diagram


Step 1
(5 points) For the use-case in PART 2 STEP 1 above, please draw the normal sequence of events as an activity
diagram. The activity diagram should match the steps you found for that use case (normal flow of events).
Lab 1 – IOT Process Design Page

Step 2
(5 points) For the use-case in PART 2 STEP 1 above, draw an activity diagram for the alternate flow.

PART 4 – General Design Questions


(3 points / 3 points) Please list a security issue or consideration that can be identified from the events happening
in the text, and propose a way to mitigate or deal with this security issue. Use the internet to research if
needed.

Security issue or consideration: The IoT monitoring device used to measure the vitals of the customers could
be used by hackers to access the WI-FI network of the client. The hacker could then install malicious software
such as worms onto the computers connected to the network.
Mitigation of the issue: Encrypting the data at transit (encryption protocols like TLS)

Source: Mbed TLS - Wikipedia


Quote : “Mbed TLS is like wolfSSL in that it is designed to fit on small, embedded devices, with the
minimum complete TLS stack requiring under 60KB of program space and under 64 KB of RAM”
Lab 1 – IOT Process Design Page

(3 points / 3 points) Please list another security issue or consideration that can be identified from the events
happening in the text, and propose a way to mitigate or deal with this security issue. Use the internet to
research if needed.

Security issue or consideration: While the data is being stored locally, if the device is lost or stolen, sensitive
medical information can be retrieved by a malicious individual and then transmitted to their computer. They
can also place malware, redirecting the machine to store data into their database.
Mitigation of the issue:
 To mitigate the possibility of malware, we should implement secure boot as it ensures that only
signed software by security authority can be executed on the device.
Source: What Is Secure Boot and How Does it Work? (makeuseof.com)
 To mitigate the possibility of transferring sensitive information to unintended individual, we should
encrypt data using encryption standards like AES.
Source: Advanced Encryption Standard (AES) - GeeksforGeeks

Can you list two privacy issues that may arise from the IoT solution described in the text?

If question is asking about privacy issues for the user:


1. Privacy violations if users are not aware of how the information is being collected and who has access to it,
and how it is being used.

2. Users may not be willing to share sensitive information as it reveals a lot about their lifestyle. (heartbeat,
blood pressure)

If question is asking about privacy security issues:


1. Device connecting to internet allows it to be vulnerable to security breaches by hackers.

2. If central database or the local storage is compromised, unauthorized people can have access to medical
information about the user.

(3 points) Is there a way anything can be crowdsourced, to help the medical industry or to help elderly patients?

Crowdsourcing means that you collect data from many people and use that data to get some kind of big picture.
In this case, we’re using the data from the machines, how can this help, if anything?

Using crowdsourcing to develop predictive analytical capabilities that reduce the load on the doctors. For
example, using the data collected from many people of different age groups to assess what “normal” vital
values should be for any given patient.
Lab 1 – IOT Process Design Page

(5 points) List 3 different sensors or output devices that can be used to gather information, communicate, or
provide output below.

Here’s a list to help you: https://www.thegeekpub.com/wiki/list-of-arduino-sensors-and-modules/

1. High accuracy temperature sensor to sense the body temperature of the patient
2. Accelerometer to detect hard falls or rapid decelerations such as in a car crash
3. Microphone sensor to detect dangerous and/or loud noises

Resources, Reference, Please See


This is a good tutorial showing a use case diagram, and a written use-case:

http://mohamedelgendy.com/blog/how-to-write-a-use-case.html

http://mohamedelgendy.com/blog/how-to-write-a-use-case-document.html

Submission Procedure
To submit your work after pasting the diagrams and answering your questions, simply upload this word
document to the assignment in Moodle.

Indicate the names of students in your group (of two) if this was done as a group. All group members must
submit the same document so they can both get their grades. BOTH members must upload the same copy each
one. If anyone doesn’t do the group work – I expect to hear about it right away, not after submission.

Name (first last) ID


Jeremy Misola-Rellin 2330210
Anvar Sultanov 2330129
Amir Ghadimi 2310074

Grading Scheme / Rubric


The weight of each question is shown in parenthesis (5 points). The total score for all questions is 60 points.
Please see the grade assigned on Moodle.

You might also like