(SEM VII) THEORY EXAMINATION 2023-24 IOT SECURITY

B.Tech Engineering 0 downloads
₹29.00

KOT071 – IOT SECURITY

B.Tech (SEM VII) – Theory Examination
Time: 3 Hours | Max Marks: 100

 

SECTION A

(Attempt all questions in brief – 2 × 10 = 20 marks)

 

a. Why is there need of IoT Security?

IoT security is needed to protect connected devices and data from cyber-attacks, unauthorized access, data theft, privacy breaches, and system manipulation, as IoT devices are widely distributed and often resource-constrained.

 

b. Define Fault Tree.

A fault tree is a graphical analytical model that represents the logical relationship between system failures and their causes, used to analyze security and reliability risks.

 

c. What is Digital Signature?

A digital signature is a cryptographic technique used to verify the authenticity, integrity, and non-repudiation of digital messages or documents.

 

d. Define Cipher text and Plain text.

Plain text: Original readable data or message.

Cipher text: Encrypted, unreadable form of the plain text.

 

e. Define Authorization and Authentication.

Authentication: Verifying the identity of a user or device.

Authorization: Granting permission to access specific resources after authentication.

 

f. Explain IAM.

Identity and Access Management (IAM) is a framework that manages digital identities, authentication, authorization, and access control for users and IoT devices.

 

g. Explain IoV.

Internet of Vehicles (IoV) is a network where vehicles communicate with other vehicles, infrastructure, pedestrians, and the cloud to enhance safety, traffic efficiency, and driving experience.

 

h. Two practical steps to enhance privacy in personal IoT applications

Use strong passwords and enable encryption

Regularly update firmware and software

 

i. Name two Cloud Services.

Infrastructure as a Service (IaaS)

Platform as a Service (PaaS)

 

j. State IoT security control needed for cloud.

Access control, data encryption, secure authentication, intrusion detection, and regular security monitoring are required for cloud-based IoT systems.

 

SECTION B

(Attempt any three – answers provided for ALL)

 

2(a). Explain several attacks that are specifically targeted at IoT.

IoT-specific attacks include device hijacking, botnet attacks (e.g., Mirai), firmware attacks, denial of service (DoS), data interception, spoofing, and physical tampering. These attacks exploit weak authentication, limited processing power, and insecure communication protocols.

 

2(b). Cryptographic controls integrated into IoT messaging and communication protocols

Cryptographic controls ensure secure communication by using encryption, authentication, and integrity mechanisms. Protocols like TLS, DTLS, AES, RSA, ECC, and hashing techniques are integrated into MQTT, CoAP, and HTTP to protect data confidentiality and prevent unauthorized access.

 

2(c). Explain all Access Management solutions for IoT.

Access management solutions include device authentication, role-based access control (RBAC), attribute-based access control (ABAC), certificate-based authentication, OAuth, and IAM systems. These ensure that only authorized devices and users can access IoT resources.

 

2(d). Privacy measures for WBSN and participatory sensing applications

Individuals can improve privacy by encrypting sensor data, disabling unnecessary data sharing, using anonymization techniques, controlling application permissions, and avoiding public Wi-Fi networks.

 

2(e). Interconnection between cloud and IoT architecture

IoT devices collect data and send it to the cloud for storage, processing, analytics, and decision-making. The cloud provides scalability, centralized management, AI integration, and security services, making it an essential component of IoT architecture.

 

SECTION C

3(a). Internet of Things (IoT): definition, components, and example

IoT is a network of physical objects embedded with sensors, software, and connectivity to exchange data over the internet.

Essential components:                       Sensors and actuators

Embedded processors                          Communication modules

Cloud platform                                      User interface

Example: Smart thermostat.

 

3(b). Why is security essential for IoT and methods to ensure it?

Security is essential to protect data, privacy, and system integrity. Methods include encryption, authentication, secure booting, firmware updates, intrusion detection, and access control.

 

4(a). Encryption techniques used for IoT security

Common encryption techniques include:      Symmetric encryption (AES)

Asymmetric encryption (RSA, ECC)                Lightweight cryptography

Hashing (SHA-256)                                      These techniques secure data during storage and transmission.

 

4(b). Explain Digital Signature, Hash, and IoT node authentication

Digital Signature: Ensures authenticity and integrity
Hash: Converts data into fixed-length value for integrity checking
IoT node authentication: Verifies device identity using keys, certificates, or tokens

 

5(a). Authorization in Publish-Subscribe schemes

Authorization in publish-subscribe systems ensures that only permitted publishers can send messages and only authorized subscribers can receive them, using access control policies.

 

5(b). Components of IoT IAM infrastructure

Components include identity registry, authentication service, authorization engine, policy management, credential storage, and monitoring systems.

 

6(a). Lightweight privacy protection in smart buildings

Lightweight schemes reduce computation while ensuring privacy using data minimization, encryption, anonymization, secure gateways, and access control to prevent vulnerabilities.

 

6(b). Social features for location privacy in IoV and ethical issues

Social features like trust-based sharing and anonymized communication improve privacy. Ethical concerns include consent, data misuse, surveillance, and transparency.

 

7(a). Security architecture for enterprise IoT in cloud

Enterprise IoT security architecture includes secure devices, encrypted communication, IAM, secure gateways, cloud security controls, monitoring, and compliance management.

 

7(b). On-device security and privacy of IoT cloud

On-device security includes secure boot, hardware root of trust, encryption, and access control. IoT cloud privacy ensures secure data storage, access control, and compliance with privacy regulations.

File Size
139.63 KB
Uploader
SuGanta International
⭐ Elite Educators Network

Meet Our Exceptional Teachers

Discover passionate educators who inspire, motivate, and transform learning experiences with their expertise and dedication

KISHAN KUMAR DUBEY

KISHAN KUMAR DUBEY

Sant Ravidas Nagar Bhadohi, Uttar Pradesh , Babusarai Market , 221314
5 Years
Years
₹10000+
Monthly
₹201-300
Per Hour

This is Kishan Kumar Dubey. I have done my schooling from CBSE, graduation from CSJMU, post graduati...

Swethavyas bakka

Swethavyas bakka

Hyderabad, Telangana , 500044
10 Years
Years
₹10000+
Monthly
₹501-600
Per Hour

I have 10+ years of experience in teaching maths physics and chemistry for 10th 11th 12th and interm...

Vijaya Lakshmi

Vijaya Lakshmi

Hyderabad, Telangana , New Nallakunta , 500044
30+ Years
Years
₹9001-10000
Monthly
₹501-600
Per Hour

I am an experienced teacher ,worked with many reputed institutions Mount Carmel Convent , Chandrapu...

Shifna sherin F

Shifna sherin F

Gudalur, Tamilnadu , Gudalur , 643212
5 Years
Years
₹6001-7000
Monthly
₹401-500
Per Hour

Hi, I’m Shifna Sherin! I believe that every student has the potential to excel in Math with the righ...

Divyank Gautam

Divyank Gautam

Pune, Maharashtra , Kothrud , 411052
3 Years
Years
Not Specified
Monthly
Not Specified
Per Hour

An IIT graduate having 8 years of experience teaching Maths. Passionate to understand student proble...

Explore Tutors In Your Location

Discover expert tutors in popular areas across India

French Classes Near Sector 42 Gurugram – Learn French with Confidence Sector 42, Gurugram
No Office Rent Business Setup Near Najafgarh Start & Grow Your Business Without Paying High Office Rent in 2026 Najafgarh, Delhi
Baking Classes Near By Dwarka Mor – Learn Professional Baking Skills Dwarka Mor, Delhi
Public Speaking Training Near Uttam Nagar – Speak with Confidence & Impact Uttam Nagar, Delhi
Science Classes Near By Dwarka Mor – Build Strong Concepts in Physics, Chemistry & Biology Dwarka Mor, Delhi
Voice-over Training Near Sushant Lok Phase 2 – Build a Powerful & Professional Voice Career Gurugram
Personal Fitness Training Near Sector 134 Greater Noida – Achieve Your Fitness Goals with Expert Guidance Sector 134, Noida
Spoken English Classes Near Rajouri Garden Improve Fluency, Build Confidence & Unlock Career Opportunities in 2026 Rajouri Garden, Delhi
Hindi Classes Near Sector 89 Gurugram – Build Language Skills with Confidence and Clarity Sector 89, Gurugram
Accounts & Commerce Classes Near By Dwarka Mor Professional Coaching Dwarka Mor, Delhi
Hindi Coaching Classes Near By Dwarka Mor Build Strong Language Skills Dwarka Mor, Delhi
Spoken English Classes Near By Lajpat Nagar Build Fluency, Confidence & Professional Communication Skills in 2026 Lajpat Nagar, Delhi
🇯🇵 Japanese Language Classes Near Sector 54 Gurugram – Learn Japanese with Expert Guidance Gurugram
Spoken English Classes Near By Hauz Khas Build Fluency, Confidence & Professional Communication Skills in 2026 Hauz Khas, Delhi
IELTS Coaching Near Noida Sector 107 – Expert Training for High Band Scores Noida
Japanese Language Classes Near Uttam Nagar – Learn Japanese for Global Opportunities Uttam Nagar, Delhi
Yoga Classes Near Malviya Nagar Build Strength, Reduce Stress & Transform Your Lifestyle with Professional Yoga Training in 2026 Malviya Nagar, Delhi
Physiotherapy Guidance (Certified Professionals Only) Near Sector 122 Noida – Complete Support for Pain Relief and Physical Recovery Sector 122, Noida
Physiotherapy Guidance (Certified Professionals Only) Near Uppal Southend – Expert Care for Pain Relief and Recovery Uppal Southend, Gurugram
Drum Lessons (Electronic Drums Preferred at Home) Near Sector 145 Noida – Learn Drumming with Expert Trainers Noida
⭐ Premium Institute Network

Discover Elite Educational Institutes

Connect with top-tier educational institutions offering world-class learning experiences, expert faculty, and innovative teaching methodologies

Réussi Academy of languages

sugandha mishra

Réussi Academy of languages
Madhya pradesh, Indore, G...

Details

Coaching Center
Private
Est. 2021-Present

Sugandha Mishra is the Founder Director of Réussi Academy of Languages, a premie...

IGS Institute

Pranav Shivhare

IGS Institute
Uttar Pradesh, Noida, Sec...

Details

Coaching Center
Private
Est. 2011-2020

Institute For Government Services

Krishna home tutor

Krishna Home tutor

Krishna home tutor
New Delhi, New Delhi, 110...

Details

School
Private
Est. 2001-2010

Krishna home tutor provide tutors for all subjects & classes since 2001

Edustunt Tuition Centre

Lakhwinder Singh

Edustunt Tuition Centre
Punjab, Hoshiarpur, 14453...

Details

Coaching Center
Private
Est. 2021-Present
Great success tuition & tutor

Ginni Sahdev

Great success tuition & tutor
Delhi, Delhi, Raja park,...

Details

Coaching Center
Private
Est. 2011-2020