Friday, 25 March 2016

WT Unit 4, 5 6 presentation

Unit 4 IOT Approaches for Empowerment - Click here to download

Unit 5 Identity Management Models in IoT - Click here to download

Unit 6 Trust Management in IoT - Click here to download

Unit 4 Question Bank

1. Explain M2M Service Layer Standardization.
2. Explain the difference between Data Interoperability and Semantic Interoperability.
3. Explain the Importance of Standardization with respect to Internet of Things.
4. Write Short Note on :
a. Organizational Interoperability
b. Eternal Interoperability
5. Write a short note on OGC Sensor Web for IoT.
6. What are the Gaps between IoT standardization, IoT Research, IoT Development and IoT Innovation?
7. What are Current IoT Requirements?
8. Explain in detail the deployment scenario for OGC sensor web enablement.
9. Write short note on:
c. ITU-T
10. Discuss the Dimensions of Interoperability briefly.
11. Explain the Research Roadmap for IoT Testing Methodologies.
12. Write Short Note on:
a. The Eternal Interoperability
b. The Organizational Interoperability
c. The Semantic Interoperability
d. The Data Interoperability
13. Explain CoAP.

Unit 5 Question Bank

1. Explain identity management. Discuss Identity portrayal in detail.
2. Discuss the difference between Local identity and Network identity
3. What are the security requirements in internet of things?
4. Explain
a. User-centric identity management,
b. Device-centric identity management
c. Hybrid identity management.
5. Write Short note on
a. Federated identity
b. Global web identity
c. Network identity
6. Explain the need of identity management in Internet of Things.

Unit 6 Question Bank

1. Explain the trust management life cycle.
2. Explain the Fuzzy approach for Trust in Internet of Things.
3. Explain the Authentication and Access control policies wrt to IoT.
4. Explain the Web of trust model.
5. Discuss the factors used for calculation of trust in IoT.
6. Write Short Note on Identity Trust Paradigms wrt:
a. Third Party Approach
b. Public key infrastructure
c. Attribute certificates.
7. Explain the difference between Attribute certificate and public key certificate
8. Discuss any two security mechanisms.
9. Write short note on:
a. Web service security
b. SAML Approach