100% found this document useful (1 vote)
297 views2 pages

Privacy and Security in Iot Kot054

Uploaded by

Gunjan Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
297 views2 pages

Privacy and Security in Iot Kot054

Uploaded by

Gunjan Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Printed Pages: 02 Sub Code:KOT-054

Paper Id: 232019 Roll


No.

B.TECH.
(SEM V) THEORY EXAMINATION 2022-23
PRIVACY AND SECURITY IN IOT
Time: 3 Hours Total Marks: 100
Note: Attempt all Sections. If you require any missing data, then choose suitably.

SECTION A

1. Attempt all questions in brief. 2x10 = 20

(a) Define term Authentication and Authorization.


(b) Illustrate the need of Security Requirements in IoT.
(c) What is Digital Signature?
(d) Differentiate between Public key and Private key.
(e) What are the 4 components of IAM?
(f) Why do we need identity and access management?
(g) Write some security attacks on trust metrics.

2
(h) How data is disseminated in IoT?
90

13
(i) Write some cloud services offered to IoT.
_2

2.
(j) Give two applications that use IoT with Cloud.
P1

24
5.
3D

SECTION B

.5
P2

2. Attempt any three of the following: 17 10x3 = 30


Q

|1
8

(a) What is Internet of Things (IoT)? What are components required to design IoT
:4

Device and which device we called IoT device explain with example.
30

(b) Define cryptographic controls built into IoT messaging and communication
:

protocols.
13

(c) What is IoT IAM infrastructure?


(d) Explain why trust management is important in IoT. Explain a few trust metrics
3
02

and how and why these trust metrics are important.


(e) Explain how cloud is related to IoT architecture.
-2
01

SECTION C
7-
|2

3. Attempt any one part of the following: 10x1 = 10

(a) How can we secure the Internet of things?


(b) Explain Security Architecture on the Internet of Things. Give some attacks
Specific to IoT.

QP23DP1_290 | 27-01-2023 13:30:48 | 117.55.242.132


4. Attempt any one part of the following: 10 x1 = 10

(a) What are the 3 most secure encryption techniques in IoT?


(b) Explain role of cryptography in IoT. Write which are 4 key pillars of
cryptography in detail.

5. Attempt any one part of the following: 10x1 = 10

(a) Define Authorization with Publish and Subscribe schemes.


(b) Explain all Access Management solutions for IoT.

6. Attempt any one part of the following: 10x1 = 10

(a) Write a note on:


(i) Trust for IoT and trust Model
(ii) Privacy preservation for IoT.
(b) Explain a few Lightweight and robust schemes for IoT Privacy protection.

7. Attempt any one part of the following: 10x1 = 10

2
(a)
90
Explain on Devices Security and Privacy of IoT cloud.

13
(b) Explain why cloud usage increases security breaches in IoT and give some
_2

2.
solutions.
P1

24
5.
3D

.5
P2

17
Q

|1
8
:4
: 30
13
3
02
-2
01
7-
|2

QP23DP1_290 | 27-01-2023 13:30:48 | 117.55.242.132

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy