IOT Model Answer End-Semester
IOT Model Answer End-Semester
TE (Computer Engineering)
Elective I: Internet of Things & Embedded System
(2019 Pattern) (Semester-V) (310245- A)
Telegram Channel
https://t.me/SPPU_TE_BE_COMP
(for all engineering Resources)
WhatsApp Channel
(for all tech updates)
https://whatsapp.com/channel/
0029ValjFriICVfpcV9HFc3b
Insta Page
(for all engg & tech updates)
https://www.instagram.com/
sppu_engineering_update
2) SCADA Protocol – 3 marks
c)What is MQTT and explain in detail. 6
Ans: - 1) MQTT=Definition of Message Queuing Telemetry Transport – 1 mark
2) publish-subscribe pattern and including components – 2 marks
3) Why MQTT used in IOT – 1 mark
4) MQTT security – 2 marks
OR
Q4. a) Explain LoRA based smart Irrigation system. 6
Ans: - 1) what is LoRA- LoRa is a low-power rate communication protocol – 1 mark
2) Bandwidth showing diagram – 1 mark
3) Irrigation system diagram - 1 mark
4) Description – 3 marks
b) Explain MODBUS protocol in detail. 6
Ans: - 1) Modbus is a serial communications protocol originally published by Modicon
(now Schneider Electric) in 1979 for use with its programmable logic controllers
(PLCs). - 1 mark
2) what is master slave protocol in MODBUS- 2 marks
3) Modbus Message Framing & Transmission Modes – 2 marks
4) Modbus TCP/IP – 1 mark
c) Examine that why ZigBee is popular than Wi-Fi and Bluetooth in IoT. 6
Ans: - 1) Zigbee Architecture – 2 marks
2) Zigbee Protocol Layers- 2 marks
3) ZigBee Node Types and comparisons – 2 marks
Q5. a) Define software define networking & Explain architecture of SDN. 6
Ans: - 1) The physical separation of the network control plane from the forwarding
plane, and where a control plane controls several devices. – 2 marks
2) Architecture of SDN- 2 marks
3) Description – 2 marks
b) Explain the Python Web application framework Django 6
Ans:- 1) Django: It is a free and open-source web framework, written in Python, which
follows the model-view-template (MVT) architectural pattern. 1 mark
2) Python web application – 3 marks
3) Framework diagram 2 marks
c) Describe the IOT messaging mechanisms called WAMP (AutoBahn for IOT). 6
Ans: - 1) Web application Messaging Protocol. – 2 marks
2) WAMP: AutoBahn description – 2 marks
3) AutoBahn diagram – 2 marks
OR
Q6. a) Define Cloud of Things & What is cloud communication API? 6
Ans: - 1) Cloud of Things is a service model in which data is maintained, managed,
backed up remotely and made available to users over a network (typically the
Internet). It is managed by a hosting company – 3 marks
2) Cloud Storage Application Programming Interface (API) is a method for
access to and utilization of a cloud storage system – 3 marks
b) Write a short note on cloud standardization. 6
Ans: - 1) What is Cloud Standardization? - 2 marks
2) What is main Issue? - 2 marks
3) What is roll of IOT std & Cloud computing in IOT. 2 marks
c) Explain the different cloud-based services offered by Amazon for IOT. 6
Ans: - 1) explain EC2 and Light shell services in detail. 3 marks each.
Q7. a) Examine how threat model is useful in securing IoT applications. 8
Ans: - 1) Security Threats in Smart Home Smart home services can be exposed to
cyber-attacks because majority of the service provider do not consider security
parameters at early stages. The possible security threats in a smart home are
eavesdropping, Distributed Denial of Service (DDoS) attacks and leakage of
information, etc. Smart home networks are threatened by unauthorized access.
2) Trespass: 2 marks
3) Monitoring and personal information leakage- 2 marks
4) DoS/DDoS- 2 marks
5) Falsification: - 2 marks
b) List out security requirements for IOT base systems. & Discuss some vulnerabilities in 9
IOT.
Ans: - 1) Security Requirement: - 1) Authentication, 2) data confidentiality, 3) Access
control, 4) trust Management, 5) Availability of Resources, 6) Secure
service, 7) Secure S/W Development, 8) Flexibility & Adoptability, 9)
Scalability, 10) Tamper Resistance- 4 marks
2) Vulnerabilities: - 1) Insecure web interface, 2) Ineffective authentication, 3)
insecure network services, 4) Lack of transport encryption, 5) Privacy concern,
6) Insecure cloud interface, 7) Insecure mobile interface, 8) Insufficient security
features, 9) Insufficient security features, 10) erasing all personal information. – 5 m
OR
Q8. a) Write a short note on Light weight cryptography. 8
Ans: - 1) What is Light weight Cryptography? 2 marks
2) Why it is required in IOT? - 2marks
3) explain Example of Light weight Cryptography- 2 marks
4) Use of Light weight Cryptography. – 2 marks
b) What is Activity Modelling of Threats? & Explain access control issue with respect to 9
IOT security.
Ans: - 1) Definition 2 marks, 2) 2 Steps 4 marks, 3) Example – 3 marks