IOT U4
IOT U4
IOT U4
Here are some explained answers for important 2 mark questions from Unit 2 of
Internet of Things course as per the syllabus:
A1) Some common M2M (machine to machine) protocols used in IoT are:
- MQTT (Message Queuing Telemetry Transport) - lightweight publish-subscribe
based protocol that works on top of TCP/IP. Used for connections with remote
locations and unstable networks.
- CoAP (Constrained Application Protocol) - specialized web transfer protocol
designed for low power and resource constrained devices. Uses UDP instead of
TCP.
- AMQP (Advanced Message Queuing Protocol) - provides reliable and secure
message queuing and delivery features using virtual channels.
- DDS (Data Distribution Service) - allows real-time communication by
publishing data to topics. Enables scalable and high performance data exchanges.
- XMPP (Extensible Messaging and Presence Protocol) - enables real-time
exchange of small structured data between devices. Uses XML format for
messaging.
A3) Zigbee is a specification for low power wireless networks based on the IEEE
802.15.4 standard. It provides network, security and application layer standards
on top of 802.15.4 to enable interoperable data transmission between remote
devices. In IoT, it is used to connect low-powered sensors, actuators and control
systems requiring two-way communication at relatively low data rates.
Here are some explained answers for important 2 mark questions from Unit 4 of
Internet of Things course as per the syllabus:
A1) The main security goals that need to be addressed in IoT systems are:
- Confidentiality - Protecting sensitive data from unauthorized access through
encryption.
- Integrity - Ensuring data is not altered in transit by verifying integrity checks.
- Authentication - Validating the identity of devices and users before allowing
access to networks and data.
- Authorization - Enforcing access control policies and providing appropriate
permissions to devices and users.
- Non-repudiation - Ensuring actions or transactions cannot be denied later by
implementing logging, auditing and digital signatures.
Here are some more explained answers for important 2 mark questions from Unit
4 of Internet of Things:
A7) Secure firmware update and integrity verification mechanisms are required
in IoT devices through:
- Digitally signed firmware images to prevent tampering.
- Secure boot mechanisms to validate firmware integrity at load time.
- Access controls around firmware modification capabilities.
- Testing firmware thoroughly for vulnerabilities before release.
Here are some more explained 2 mark answers for Unit 4:
A11) A botnet attack involves taking control of multiple vulnerable IoT devices
using malware and commanding them to perform cyber attacks in a coordinated
fashion across the network. Common botnet attacks include distributed denial of
service, spamming, click fraud, mining cryptocurrency and infecting other
devices to expand the botnet.
This allows attackers to gain unauthorized access and compromise security. User
education is important to prevent social engineering.
Q14) How can secure software development be ensured for IoT systems?
Q20) What are the ways to implement IoT data security in the cloud?
A21) A honeypot is a system designed to act like a fake IoT device or network to
attract attackers. Since it does not have any real usage, any access attempts are
likely unauthorized probes which can be monitored to learn about threats.
Honeypots allow observation of attacker behavior for security intelligence.
Q22) What is the role of penetration testing in IoT security?
A23) A passive RFID tag does not have its own power source and reflects back
the radio waves from the RFID reader to transmit data. Security risks include:
Q24) How can brute force attacks be prevented against IoT devices?
Q25) What are the benefits of implementing security logging and monitoring for
an IoT system?
A25) Benefits include:
Here are some more explanatory 2 mark answers for Unit 4 of Internet of Things:
Q27) What are the benefits of a layered security approach for IoT?
Q28) What are the different types of malware attacks against IoT devices?
Q29) What are the techniques used to secure IoT data analytics?
Here are some very important 2 mark questions with simple answers for Unit 4
on IoT security:
Data aggregation is needed in smart city IoT applications for the following
reasons:
- Massive volume of data generated from numerous sensors and devices across
the city. Aggregation helps reduce and make sense of this data.
- Enables identifying macro trends, patterns and insights not visible in separate
data streams.
2. What are contribution from FP7 projects? Why its need ? What are security,
privacy, trust in IoT data platform for smart cities?
- Smart city IoT data platforms need end-to-end security, privacy protections and
trust frameworks:
- Encryption, access controls and cyber threat protections.
- Lack of trust can lead to IoT systems undermining their usefulness by not
sharing data, taking inconsistent actions and being vulnerable to attacks.
- Blockchain, access controls and standards like Trusted IoT Alliance promote
trust between IoT systems, users and service providers.
- Trust must be maintained not just during initial deployment but throughout the
lifecycle via security updates, resilience to outages, responsible disclosure etc.
- IoT collects vast amounts of personal and sensitive data like locations, activities,
utilities usage etc. which expose users to privacy risks if not protected.
- Privacy breaches lead to concerns among users which limit IoT adoption. Laws
like GDPR impose fines for privacy violations.
- Techniques like anonymization, data encryption, consent requirements,
decentralized identity management and audits help safeguard privacy.
- Privacy needs to be safeguarded not just in individual IoT devices but across the
entire ecosystem including cloud platforms.