0% found this document useful (0 votes)
23 views2 pages

Of Things Security

Uploaded by

sandeshs4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views2 pages

Of Things Security

Uploaded by

sandeshs4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Total No. of Questions : 8] SEAT No.

8
23
P-2875 [Total No. Of Pages : 2

ic-
tat
[6004]-717

0s
B.E.(Honors)

3:0
02 91
INTERNET OF THINGS SECURITY

4:5
0
31
(410603) (2019 Pattern) (Semester-VIII)
9/0 13
Time : 2½ Hours] [Max. Marks : 70
0
6/2
.23 GP

Instructions to the candidates :


1) Answer Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
E

2) Neat diagrams must be drawn wherever necessary.


81

8
C

23
3) Figures to the right indicate full marks.

ic-
4) Assume suitable data, if necessary.
16

tat
8.2

0s
Q1) a) Explain in detail-Security Goals in IoT. [6]
.24

3:0
b) What is Public-Key-Based Authentication? Explain with suitable example.
91
49

4:5
[6]
30
31

c) Explain - Existing Security Schemes for IoT. [5]


01
02

OR
6/2
GP

Q2) a) What is Identity-Based Authentication? Explain with suitable example.[6]


9/0
CE

b) Explain CoAP protocol for the IoT environment. [6]


81

8
23
c) What is Lightweight Cryptography? Explain with example. [5]
.23

ic-
16

Q3) a) Explain the data life cycle in IoT, with suitable example. [6]
tat
8.2

0s

b) How can we protect data in IoT? Which parameters are used to protect
.24

3:0

the data in IoT? [6]


91
49

4:5

c) How can security be provided in the Network Layer of IoT Architecture?


30

[6]
31
01
02

OR
6/2
GP

Q4) a) How can security be provided in the Service Layer IoT Architecture?[6]
9/0
CE

b) What are the Threats Caused in Maintenance of IoT? [6]


81
.23

c) How can security be provided in the Application Interface Layer of IoT


16

Architecture? [6]
8.2

P. T. O
.24
49
8
23
Q5) a) How to provide Security in Identification and Tracking Technologies?

ic-
Explain with suitable example. [6]

tat
b) List and explain main potential attacks in 6LoWPAN. Discuss security

0s
protocols and privacy issues in 6LoWPAN. [5]

3:0
02 91
4:5
c) Using which secutity schemes information in Wireless Sensor Networks

0
31
(WSNs) can be protected? [6]
9/0 13
0
6/2 OR
.23 GP

Q6) a) What are the security attacks in WSNs? How to avoid them? [6]
E
81

8
C

23
b) What are the threats and challenges to achieve security in the - identification

ic-
and tracking technologies of the IoT Environment. [5]
16

tat
8.2

0s
c) How do you maintain confidentiality and security for IoT based health
.24

3:0
care applications? [6]
91
49

4:5
Q7) a) How can security be provided in Smart Cities? [6]
30
31
01

b) What can be the security threats to the Connected Cars? How can security
02
6/2

be provided to Connected Cars? [6]


GP
9/0

c) How can Blockchain Technology be used in the Security and Privacy in


CE
81

8
IoT? [6]

23
.23

OR ic-
16

tat
8.2

0s

Q8) a) Describe blockchain enabled food supply chain traceability system in


.24

3:0

detail. [6]
91
49

4:5
30

b) Comment on "Blockchain in IoT". [6]


31
01
02

c) Briefly discuss the case study on "Smart Home". [6]


6/2
GP
9/0
CE
81

  
.23
16
8.2
.24

[6004]-717 2
49

You might also like