Você está na página 1de 7

CS2153-Privacy and Security in IoT.

Question Bank
UNIT-I
Part-A
1. State the security issues in IoT.
2. What are the top 10 vulnerabilities in IoT?
3. Describe cross layer threats.
4. Specify any two threats caused in maintenance of
IoT.
5. How security plays a major role in SCADA systems?
6. State any four important features of security in
healthcare.
7. What are the basic processes in transport layer
security?
8. Draw an IoT cloud based system.
9. Write the steps for software/firmware update.
Part-B
1. Draw and explain the security requirements in IoT
Architecture in sensing layer, network layer, service
layer and application interface layer.
2. Explain the concept of security in enabling
technologies such as
Identification and Tracking
Integration of WSN and RFid
Communication, networks and
Service management
3. Explain a simple example of secret capacity over
wireless communication.
4. Write a note on Authentication and Authorization
for smart devices.
5. Brief about the role of components in physical layer
security at IoT devices.
UNIT-II
Part-A
1. What are the features that
cryptography can provide to any data?
2. State the four categories of
cryptographic primitive types.
3. What is the need for counter mode?
4. What are hashes?
5. What are cipher-suites?
6. Define key escrow?
7. State the security configuration in
ZigBee?
8. Name the security keys used in
Bluetooth –LE?
9. What is the role of blockchain in trust
establishment?
Part-B
1. Draw and explain the Encrypt=decrypt-graffle
enhanced with symmetric encryption.
2. Explain with necessary schematic how digital
signatures are verified in symmetric and
asymmetric modes
3. Draw and explain the method of random number
generation.
4. Briefly explain the cryptographic module principles
5. Write about cryptographic key management
fundamentals
6. Explain the cryptographic controls built into IoT
messaging protocols.
UNIT-III
Part-A
1. State the need for holistic IoT IAM?
2. Define attribute based access control.
3. Describe secure bootstrap?
4. What do you mean by local access?
5. What is a trust store?
Part-B
1. Write short notes on account
monitoring and control.
2. Draw the schematic of PKI Primer
architecture and explain its operation.
3. Explain security in terms of
authorization and access control.
4. Write short notes on different types of
symmetric keys.
UNIT-IV
Part-A
1. Define data centric network sensor
network.
2. Define one time mask.
3. State the assumptions on
trustworthiness.
4. Write the principle attack vectors in IoT
device communication
5. What are the peer authentication
protocols in IoT?
6. What is NG Architecture?
7. Define conflict balancing.
Part-B
1. Draw the spatial privacy graph for SPG
based data dissemination.
2. Explain the distributed coloring
algorithm in detail.
3. Briefly explain the one time
permutation scheme for security
performance analysis.
4. Compare and contrast any three trust
models.
5. Explain the current technologies,
Limitations and Emerging Solutions for IoT.
6. Draw the example scenario of NG model
for IoT
7. Explain the analysis of dynamic game
model for cooperative Authentication.
UNIT-V
Part-A
1. Define sensor coordination.
2. What is information sharing?
3. Describe AWS IoT.
4. State the advantages of Cisco Fog
computing?
5. What is SDN?
6. Define Micro services.
Part-B
1. Explain the targeted threats from a
cloud perspective.
2. Briefly explain the Microsoft Azure
IoT Suite.
3. With a neat sketch explain the IBM
Watson IoT Platform.
4. Draw the generalized virtual private
cloud to protect endpoint security and
explain.
5. Brief about the future directions in
cloud enabled platform.

Você também pode gostar