(SEM V) THEORY EXAMINATION 2024-25 PRIVACY AND SECURITY IN IOT

B.Tech Cyber Security 0 downloads
₹29.00

Subject Code: BCIT056
Maximum Marks: 70
Time: 3 Hours
Paper ID: 310324

Question Paper Overview

SECTION A (2 × 7 = 14 Marks)

(Short-answer conceptual questions)

a. Describe the specific attacks unique to IoT systems.
b. How does transport encryption complement secrecy and secret-key capacity in secure communication?
c. How does hashing ensure data integrity in resource-constrained environments?
d. How do cryptographic primitives enable secure communication in IoT?
e. Analyze the challenges of managing authentication credentials in IoT ecosystems.
f. What are the key privacy concerns in IoT data dissemination?
g. How can edge computing complement cloud security in IoT ecosystems?

SECTION B (Attempt any three × 7 = 21 Marks)

a. What are the core security requirements for IoT architecture, and how do they differ across enabling technologies and IoT applications?
b. Discuss the challenges of key management in IoT environments. How do lightweight key management solutions enhance system security?
c. Describe the identity lifecycle in IoT systems and how it ensures secure device onboarding and decommissioning.
d. Discuss the trade-offs between privacy protection and system performance in IoT environments. Provide examples of robust privacy schemes.
e. Discuss the implications of data sovereignty and compliance requirements in cloud-enabled IoT systems.

SECTION C (Attempt one part from each question × 7 = 35 Marks)

Q3

(a) What are the primary barriers to implementing robust access control in IoT, and how can emerging technologies address these challenges?
OR
(b) Using attack and fault trees, evaluate a real-world IoT application to identify potential threats and propose mitigation strategies.

Q4

(a) Analyze the role of random number generation in IoT cryptography. How does it impact the overall security of cryptographic protocols?
OR
(b) How do cryptographic techniques balance security and performance in IoT systems with constrained computational resources?

Q5

(a) How does the concept of least privilege apply to IoT access control? Provide examples of its implementation.
OR
(b) Evaluate the effectiveness of different access control models in IoT systems. Which model is most suitable for a highly dynamic IoT environment?

Q6

(a) How do self-organizing IoT devices ensure security and trust without centralized control? Discuss potential vulnerabilities.
OR
(b) Discuss the importance of transparency in IoT trust models. How does it influence user confidence and system adoption?

Q7

(a) How do cloud service offerings enhance IoT capabilities? Discuss the security implications of integrating IoT with cloud services.
OR
(b) How do cloud service providers address the unique security needs of IoT applications? Provide examples of specific offerings.

Key Topics for Revision

1. IoT Security Challenges

Unique Threats:

Physical tampering                   Man-in-the-middle (MITM) attacks

Device impersonation              Botnets (e.g., Mirai)

Side-channel attacks                Firmware manipulation

Constraints: Limited CPU, memory, and energy make traditional security models unsuitable.

2. Cryptographic Primitives

Hashing: Ensures data integrity by generating unique digests (SHA-256, SHA-3).

Symmetric encryption: AES, lightweight ciphers (SPECK, PRESENT).

Asymmetric encryption: ECC preferred over RSA for low-power IoT.

Transport Encryption: TLS/DTLS ensures confidentiality over insecure networks.

3. Key Management in IoT

Challenges: Device heterogeneity, large-scale deployment, limited processing power.

Solutions:

Lightweight protocols (Elliptic Curve Diffie–Hellman).            Pre-shared keys (PSK).

Group key management.                                                         Blockchain-based key distribution.

4. Identity and Authentication

Identity Lifecycle:

Onboarding → secure registration of device.         Operation → authenticated communication.

Decommissioning → revoke keys, erase data.

Techniques: X.509 certificates, mutual authentication, OAuth 2.0.

5. Privacy Protection vs System Performance

Trade-offs:

Strong encryption improves privacy but increases latency/power usage.

Edge AI helps achieve local processing to minimize data exposure.

Schemes: Differential privacy, homomorphic encryption, federated learning.

6. Data Sovereignty & Compliance

Definition: Legal control over data stored/transferred across borders.

Regulations: GDPR (EU), CCPA (USA), India’s DPDP Act 2023.

Challenge: Ensuring compliance in global IoT-cloud systems.

7. Access Control in IoT

Barriers:                                Dynamic device environments.

Weak authentication.             Resource limitations.

Models:                                 RBAC (Role-Based)

ABAC (Attribute-Based)         CapBAC (Capability-Based) → most flexible for IoT.

Least Privilege Principle: Devices get minimum required permissions only.

8. Random Number Generation

Importance: Used in key generation, nonces, session tokens.

Weak RNG → predictable keys.

Solutions: Hardware RNGs, entropy harvesting, hybrid RNG algorithms.

9. Self-Organizing IoT Security

Mechanisms: Peer-to-peer trust, distributed consensus, local verification.

Vulnerabilities: Sybil attacks, malicious peer injection.

Solution: Blockchain or DLT-based distributed trust.

10. Transparency and Trust Models

Transparency builds user confidence by exposing how data is processed and shared.

Trust Models: Reputation-based, certificate-based, blockchain-based.

Example: Smart city devices use transparent data-sharing logs for auditing.

11. Cloud–IoT Integration

Advantages: Scalability, remote monitoring, AI analytics.

Risks: Data leakage, API vulnerabilities, misconfigurations.

Secure Solutions:

End-to-end encryption.

IAM (Identity and Access Management).

Cloud service models (AWS IoT Core, Azure IoT Hub, Google IoT Core).

12. Attack & Fault Trees

Attack Tree: Hierarchical diagram showing possible ways to exploit a system.

Fault Tree: Shows failures leading to system compromise.

Used to identify vulnerabilities and design countermeasures (e.g., IoT Smart Lock threats).

Key Terms Summary

TermMeaning
SecrecyPreventing unauthorized data access.
IntegrityEnsuring data isn’t modified.
AvailabilityGuaranteeing access when needed.
Non-repudiationPrevent denial of actions.
AuthenticationVerifying device or user identity.
AuthorizationDefining what operations are allowed.

Exam Preparation Tips

Prepare definitions + real-world examples (Smart Home, Industrial IoT, Healthcare).

Draw diagrams for access control models, attack trees, and IoT architecture layers.

Highlight standards: TLS/DTLS, MQTT over TLS, CoAP with OSCORE, ECC.

Focus on trade-off analysis (privacy vs performance, edge vs cloud).

File Size
141.54 KB
Uploader
SuGanta International
⭐ Elite Educators Network

Meet Our Exceptional Teachers

Discover passionate educators who inspire, motivate, and transform learning experiences with their expertise and dedication

KISHAN KUMAR DUBEY

KISHAN KUMAR DUBEY

Sant Ravidas Nagar Bhadohi, Uttar Pradesh , Babusarai Market , 221314
5 Years
Years
₹10000+
Monthly
₹201-300
Per Hour

This is Kishan Kumar Dubey. I have done my schooling from CBSE, graduation from CSJMU, post graduati...

Swethavyas bakka

Swethavyas bakka

Hyderabad, Telangana , 500044
10 Years
Years
₹10000+
Monthly
₹501-600
Per Hour

I have 10+ years of experience in teaching maths physics and chemistry for 10th 11th 12th and interm...

Vijaya Lakshmi

Vijaya Lakshmi

Hyderabad, Telangana , New Nallakunta , 500044
30+ Years
Years
₹9001-10000
Monthly
₹501-600
Per Hour

I am an experienced teacher ,worked with many reputed institutions Mount Carmel Convent , Chandrapu...

Shifna sherin F

Shifna sherin F

Gudalur, Tamilnadu , Gudalur , 643212
5 Years
Years
₹6001-7000
Monthly
₹401-500
Per Hour

Hi, I’m Shifna Sherin! I believe that every student has the potential to excel in Math with the righ...

Divyank Gautam

Divyank Gautam

Pune, Maharashtra , Kothrud , 411052
3 Years
Years
Not Specified
Monthly
Not Specified
Per Hour

An IIT graduate having 8 years of experience teaching Maths. Passionate to understand student proble...

Explore Tutors In Your Location

Discover expert tutors in popular areas across India

Spoken English Classes Near By Sarita Vihar Improve Fluency, Build Confidence & Unlock Career Opportunities in 2026 Sarita Vihar, Delhi
Yoga Classes Near Malviya Nagar Build Strength, Reduce Stress & Transform Your Lifestyle with Professional Yoga Training in 2026 Malviya Nagar, Delhi
SEO Training Near Sector 63 Gurugram – Master Search Engine Optimization & Build a High-Growth Career Sector 63, Gurugram
Spoken English Classes Near By Tilak Nagar Improve Fluency, Build Confidence & Unlock Career Opportunities in 2026 Tilak Nagar, Delhi
UI/UX Designing Classes Near By Kirti Nagar – Build a Creative Tech Career Kirti Nagar, Delhi
SEO Training Near Noida Sector 95 – Learn Search Engine Optimization and Build a Digital Career Noida
Spoken English Classes Near By Mehrauli Build Fluency, Improve Confidence & Unlock Better Opportunities in 2026 Mehrauli, Delhi
TOEFL Coaching Near Noida Sector 104 – Complete Preparation Guide for Study Abroad Sector 104, Noida
Public Speaking Training Near Sector 108 Noida – Build Confidence and Communication Skills Noida
Yoga Classes Near Sector 105 Gurugram (Dwarka Expressway) – Transform Your Body & Mind Naturally Gurugram
Guitar Classes Near By Kalkaji Learn Guitar from Experts & Turn Your Musical Passion into a Lifelong Skill Kalkaji, Delhi
Spoken English Classes Near By Defence Colony Improve Communication Skills, Confidence & Career Opportunities in 2026 Defence Colony, Delhi
Guitar Classes Near By Greater Kailash Learn Guitar with Expert Guidance & Transform Your Passion into a Lifelong Skill Greater Kailash, Delhi
Yoga Classes Near by Dwarka Mor – A Complete Guide to Better Health & Wellness Dwarka Mor, Delhi
Maths Coaching Near Sector 88 Gurugram – Build Strong Concepts, Improve Scores, and Gain Confidence Sector 88, Gurugram
Violin Classes Near DLF Phase 5 – Learn, Grow & Perform with Confidence DLF Phase V, Gurugram
Geography Coaching Classes Near By Dwarka Mor Build Strong Conceptual Understanding & Score High in Board Exams Dwarka Mor, Delhi
Spoken English Classes Near By Vasant Kunj Improve Fluency, Build Confidence & Achieve Career Growth in 2026 Vasant Kunj, Delhi
Web Development Classes Near Noida Sector 101 – Learn Coding and Build Your Tech Career Noida
Spoken English Classes Near By Greater Kailash Improve Fluency, Build Confidence & Unlock Career Opportunities in 2026 Greater Kailash, Delhi
⭐ Premium Institute Network

Discover Elite Educational Institutes

Connect with top-tier educational institutions offering world-class learning experiences, expert faculty, and innovative teaching methodologies

Réussi Academy of languages

sugandha mishra

Réussi Academy of languages
Madhya pradesh, Indore, G...

Details

Coaching Center
Private
Est. 2021-Present

Sugandha Mishra is the Founder Director of Réussi Academy of Languages, a premie...

IGS Institute

Pranav Shivhare

IGS Institute
Uttar Pradesh, Noida, Sec...

Details

Coaching Center
Private
Est. 2011-2020

Institute For Government Services

Krishna home tutor

Krishna Home tutor

Krishna home tutor
New Delhi, New Delhi, 110...

Details

School
Private
Est. 2001-2010

Krishna home tutor provide tutors for all subjects & classes since 2001

Edustunt Tuition Centre

Lakhwinder Singh

Edustunt Tuition Centre
Punjab, Hoshiarpur, 14453...

Details

Coaching Center
Private
Est. 2021-Present
Great success tuition & tutor

Ginni Sahdev

Great success tuition & tutor
Delhi, Delhi, Raja park,...

Details

Coaching Center
Private
Est. 2011-2020