question archive CIS4019-N The Scenario An airport management organisation is responsible for handling baggage of the passengers

CIS4019-N The Scenario An airport management organisation is responsible for handling baggage of the passengers

Subject:Computer SciencePrice:23.99 Bought3

The Scenario
An airport management organisation is responsible for handling baggage of the passengers. Currently, there are many problems with baggage systems and complaints for baggage lost are increasing. The company wants to track the baggage in the airport from unloading until passenger receives it.

They decided to deploy IoT sensors with short-range communication in the airport, which can detect any baggage. The information about last reported location of baggage is sent to base station, which is connected to Internet. This information should be accessible to staff.

 You will work in groups (4 persons) and write a report of around 2000 words describing design and simulation of new system. It will include two parts

Part 1:

a.            Overall Architecture and Design of the system

b.            Details of the design of the IOT system and justification of selected technologies and software to provide communication: including

•             The HW platform/ Processor (s) • The operating system and drivers

•             The sensors and actuators.

•             The physical channel?—?BLE/Zigbee etc (Remember short range/ not to interfere with other)

•             The logical channel?—?What protocols the SW uses to transport these messages (HTTP / MQTT etc)

•             Network/connectivity topology

•             Maintenance

•             Data Storage

•             Data Access

•             Cost

Part 2:

c.             Your report must also include details of simulation of the given scenario to demonstration communication using appropriate simulation tool. You can include screenshots/results/ code etc. Requirement of the simulation are

i               A static network of 50+ nodes with one or two base station nodes

ii              Tracking of a moving node (luggage)

iii             Transmission of  approximate Current location (of moving node) to base station at periodic intervals

d.            Reflection on potential professional and ethical issues associated with the proposed system.


You should submit your group report as a PDF/Word document via blackboard. Each section of the report must indicate the contribution of each group member.  Each member of the group is also required to submit a completed copy of the peer review form . Template will be provided on blackboard. Please make sure the total points are equal to 13.


 Consult the module tutors during a scheduled session or email both tutors


 There are three aspects to be assessed:


•             [Design] (LO 2,3) Designing an appropriate IoT application with understanding of key concepts of IoT systems and selection of appropriate technologies of IoT systems covering aspects defined in Task 1 ; [40%]


•             [Implement] (LO 5,6) Demonstrating an working model of  IoT systems through simulation and identifying professional and ethical issues associated with the given scenario, coverings aspects defined in Task 2  ; [40%] 


•             [Write] (LO 1) Demonstrating report writing and research capabilities.[20%]


Group Work Assessment

Final Individual marks will be assigned with respect to everyone's contribution in report. It will be cross checked against peer assessment forms and scaled according to peer assessment form.

another Assignment- 

A layer-wise component and security analysis of an IoT application
You need to do a layer-wise component and security analysis of a selected IoT application and make a report of process (approx. 2000 words).


CyberHealth Ltd. is a Teesside based cybersecurity solution provider, where you are working as a cybersecurity expert. Your company provides Networking & Cybersecurity solutions for the business environment. They currently offer managed, professional, and hardware & software services.  Recently, few companies have approached CyberHealth to offer them services for their IoT solution clients. CyberHealth is interested in extending its business by providing services to its customers who offer IoT solutions.

The use of telemedicine with the support IoT has increased globally due to COVID-19.  Your company is more interested in healthcare related IoT solution providers or customers. In this context, you are assigned to analyse the security of an existing remote monitoring system (offered by an IoT solution provider) for elderly and chronic disease patients.




Task 1 (T1): Compare the three- and five-layered architecture of the IoT-based remote patient monitoring system (e.g., fall detection and reporting or any app selected from Google’s play or Apple’ Apps store and uses mobile sensors) in terms of security (e.g., cybersecurity, physical security) (20%). For the task you need to include:

•             A diagram of the architecture (5%)

•             Brief description of the security features supported by each layer (e.g., sensing or perception) to protect their components (e.g., sensor or sensors, routers, apps) (15%).

Task 2 (T2): What is Risk in cybersecurity? Do a risk assessment of the selected IoT application using a risk assessment framework. You can select any framework you prefer (15% mark).

Task 3 (T3): Explain with examples how you would analyse the end-to-end (E2E) security vulnerabilities or concerns (using the 3-layer architecture in task 1 and its layer-wise components) of the selected solution (40% mark). For this task,

-              be precise about tools and methods,

-              justify all your decisions, and

-              Discussion needs to be linked with the selected application.

Task 4 (T4): Discuss countermeasures or mitigation mechanisms for the identified security vulnerabilities or concerns of the sensing (in task 3) layer of the selected patient monitoring system (10%).

Task 5 (T5): Machine Learning (ML) is an essential technology in IoT to process and make decision based on the sensed data.  However, adversaries can use a variety of attack (also known as adversarial attacks) methods to disrupt a ML model, either during the training phase or after the model has already been trained.  Discuss a list of potential adversarial attacks with examples possible in autonomous or driverless car (10% mark) domain of IoT.

Task 6 (T6): Write the report clearly and professionally (i.e., using references and figures where appropriate) regarding technical issues in an IoT network and security (5% mark). 



You should submit your report as a PDF document via online (Blackboard)

The tasks T1-T4 cover the learning outcome 4 (total 80% mark), task T5 covers learning outcome 7, and task T6 covers learning outcome 1.

Marks will be assigned as in the following table.

Option 1

Low Cost Option
Download this past answer in few clicks

23.99 USD


Option 2

Custom new solution created by our subject matter experts


rated 5 stars

Purchased 3 times

Completion Status 100%