Total No. of Questions : 8] SEAT No.
8
23
P-2875 [Total No. Of Pages : 2
ic-
tat
[6004]-717
0s
B.E.(Honors)
3:0
02 91
INTERNET OF THINGS SECURITY
4:5
0
31
(410603) (2019 Pattern) (Semester-VIII)
9/0 13
Time : 2½ Hours] [Max. Marks : 70
0
6/2
.23 GP
Instructions to the candidates :
1) Answer Q1 or Q2, Q3 or Q4, Q5 or Q6, Q7 or Q8.
E
2) Neat diagrams must be drawn wherever necessary.
81
8
C
23
3) Figures to the right indicate full marks.
ic-
4) Assume suitable data, if necessary.
16
tat
8.2
0s
Q1) a) Explain in detail-Security Goals in IoT. [6]
.24
3:0
b) What is Public-Key-Based Authentication? Explain with suitable example.
91
49
4:5
[6]
30
31
c) Explain - Existing Security Schemes for IoT. [5]
01
02
OR
6/2
GP
Q2) a) What is Identity-Based Authentication? Explain with suitable example.[6]
9/0
CE
b) Explain CoAP protocol for the IoT environment. [6]
81
8
23
c) What is Lightweight Cryptography? Explain with example. [5]
.23
ic-
16
Q3) a) Explain the data life cycle in IoT, with suitable example. [6]
tat
8.2
0s
b) How can we protect data in IoT? Which parameters are used to protect
.24
3:0
the data in IoT? [6]
91
49
4:5
c) How can security be provided in the Network Layer of IoT Architecture?
30
[6]
31
01
02
OR
6/2
GP
Q4) a) How can security be provided in the Service Layer IoT Architecture?[6]
9/0
CE
b) What are the Threats Caused in Maintenance of IoT? [6]
81
.23
c) How can security be provided in the Application Interface Layer of IoT
16
Architecture? [6]
8.2
P. T. O
.24
49
8
23
Q5) a) How to provide Security in Identification and Tracking Technologies?
ic-
Explain with suitable example. [6]
tat
b) List and explain main potential attacks in 6LoWPAN. Discuss security
0s
protocols and privacy issues in 6LoWPAN. [5]
3:0
02 91
4:5
c) Using which secutity schemes information in Wireless Sensor Networks
0
31
(WSNs) can be protected? [6]
9/0 13
0
6/2 OR
.23 GP
Q6) a) What are the security attacks in WSNs? How to avoid them? [6]
E
81
8
C
23
b) What are the threats and challenges to achieve security in the - identification
ic-
and tracking technologies of the IoT Environment. [5]
16
tat
8.2
0s
c) How do you maintain confidentiality and security for IoT based health
.24
3:0
care applications? [6]
91
49
4:5
Q7) a) How can security be provided in Smart Cities? [6]
30
31
01
b) What can be the security threats to the Connected Cars? How can security
02
6/2
be provided to Connected Cars? [6]
GP
9/0
c) How can Blockchain Technology be used in the Security and Privacy in
CE
81
8
IoT? [6]
23
.23
OR ic-
16
tat
8.2
0s
Q8) a) Describe blockchain enabled food supply chain traceability system in
.24
3:0
detail. [6]
91
49
4:5
30
b) Comment on "Blockchain in IoT". [6]
31
01
02
c) Briefly discuss the case study on "Smart Home". [6]
6/2
GP
9/0
CE
81
.23
16
8.2
.24
[6004]-717 2
49