0% found this document useful (0 votes)
15 views2 pages

P&siot

Project management and project work
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

P&siot

Project management and project work
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Code No: R204147C R20 Set No.

1
IV B.Tech I Semester Advanced Supplementary Examinations, May – 2024
PRIVACY AND SECURITY IN IOT
(PE-III: CSE-IOTCSIBCT & CSE- IOT)

Time: 3 hours Max. Marks: 70


Answer any FIVE Questions
ONE Question from Each unit
All Questions Carry Equal Marks
*****
UNIT - I
1 a) Explain how to provide the security in integration of WSN and RFID. [7]
b) Illustrate the various types of attacks specific to IoT. [7]
(OR)
2 a) Discuss various security concerns in application areas of IoT. [7]
b) Create an attack tree for a healthcare IoT system, focusing on the potential
risks and threats to patient data and medical devices. [7]

UNIT - II
3 a) Explain the role of digital signatures in ensuring the authenticity of data in
IoT. [7]
b) List and describe the components of a typical cipher suite used in IoT
communication. [7]
(OR)
4 a) Describe the common methods for generating random numbers in IoT
devices. [7]
b) Illustrate various IoT communication protocols and how does encryption
enhance the security of IoT messages and data? [7]

UNIT - III
5 a) Draw and explain the Identity lifecycle for IoT with neat sketch. [7]
b) Describe the concept of token-based authentication and how it can be
employed to authorize IoT devices in a publish/subscribe architecture. [7]
(OR)
6 a) Summarize the best practices for creating strong and unique passwords/
cryptographic keys for IoT devices to prevent credential-based attacks? [7]
b) Compare and contrast role-based access control (RBAC) and attribute-based
access control (ABAC) in IoT systems. [7]

1 of 2
Code No: R204147C R20 Set No. 1

UNIT - IV
7 a) Explain the trade-offs between lightweight and robust privacy schemes in the
context of IoT? [7]
b) Discuss the security concerns and challenges associated with self-organizing
things in IoT. [7]
(OR)
8 a) Explain how can healthcare providers ensure the privacy of patient data
while utilizing IoT devices with suitable example? [7]
b) Analyze the role of encryption in preventing unauthorized access in IoT. [7]
UNIT - V
9 a) Draw and explain the IoT cloud architecture with neat block diagram? [7]
b) Describe the role of firewalls and intrusion detection systems (IDS) in
protecting IoT devices when they communicate with cloud services. [7]
(OR)
10 a) Explain about Cloud IoT services that are commonly used in various
industries with one example? [7]
b) Describe the potential benefits and challenges of cloud-enabled IoT
computing? [7]

2 of 2

You might also like