P&siot
P&siot
1
IV B.Tech I Semester Advanced Supplementary Examinations, May – 2024
PRIVACY AND SECURITY IN IOT
(PE-III: CSE-IOTCSIBCT & CSE- IOT)
UNIT - II
3 a) Explain the role of digital signatures in ensuring the authenticity of data in
IoT. [7]
b) List and describe the components of a typical cipher suite used in IoT
communication. [7]
(OR)
4 a) Describe the common methods for generating random numbers in IoT
devices. [7]
b) Illustrate various IoT communication protocols and how does encryption
enhance the security of IoT messages and data? [7]
UNIT - III
5 a) Draw and explain the Identity lifecycle for IoT with neat sketch. [7]
b) Describe the concept of token-based authentication and how it can be
employed to authorize IoT devices in a publish/subscribe architecture. [7]
(OR)
6 a) Summarize the best practices for creating strong and unique passwords/
cryptographic keys for IoT devices to prevent credential-based attacks? [7]
b) Compare and contrast role-based access control (RBAC) and attribute-based
access control (ABAC) in IoT systems. [7]
1 of 2
Code No: R204147C R20 Set No. 1
UNIT - IV
7 a) Explain the trade-offs between lightweight and robust privacy schemes in the
context of IoT? [7]
b) Discuss the security concerns and challenges associated with self-organizing
things in IoT. [7]
(OR)
8 a) Explain how can healthcare providers ensure the privacy of patient data
while utilizing IoT devices with suitable example? [7]
b) Analyze the role of encryption in preventing unauthorized access in IoT. [7]
UNIT - V
9 a) Draw and explain the IoT cloud architecture with neat block diagram? [7]
b) Describe the role of firewalls and intrusion detection systems (IDS) in
protecting IoT devices when they communicate with cloud services. [7]
(OR)
10 a) Explain about Cloud IoT services that are commonly used in various
industries with one example? [7]
b) Describe the potential benefits and challenges of cloud-enabled IoT
computing? [7]
2 of 2