Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

ITC571 - Project Proposal and Plan 1000 – 2000 Words (5-6 pages) Please remove text in red before the submission. Full Name Student ID Subject ITC571 – Emerging Technology and Innovations Assignment...

1 answer below »
ITC571 - Project Proposal and Plan
1000 – 2000 Words (5-6 pages)
Please remove text in red before the submission.
    Full Name
    
    Student ID
    
    Subject
    ITC571 – Emerging Technology and Innovations
    Assignment No
    Project Proposal and Plan
    Due Date
    13-Dec-2019
    Lecturer’s Name
    
Title
Emerging Technology and Innovation Topic (My topic is on IOT, IOE SECURITY USING BLOCKCHAIN)
You will write here the area/field that you are going to work on it. E.g..; Security using Blockchain, Blockchain for IoT networks etc.
Project Blog (Web address provided)
Web link of your blog/website: http:
thinkspace.csu.edu.au
http
……….
INTRODUCTION
· Start your writing by providing background information about the topic and its cu
ent/existing solution
· Continue your writing to set the need for the research (what is the important of solving this problem/why you need to solve it)
2. Rationale
1. Problem domain
2. Purpose and justification
3. Supervisor Approval - Yes
4. Research Questions
5. Conceptual or Theoretical Framework
· Continue your writing to set the Motivation for the research as a starting point (what is the problem in the cu
ent/existing solutions that you need to solve)
· Why your research is significant or Why is it an interesting or useful problem?
· What are the researchers in the area were trying to find out?
4. Research Questions
· What is the aim or objective of your research?
6. Methodology
1. Analysis of sources of information (EndNote, APA Referencing Style)
2. Research method(s)
3. Data collection or systems design methods
4. Ethical Issues
5. Compliance Requirements (Workplace, Industry or Government regulations)
What are you going to propose to solve the problem that is existing in the cu
ent/existing solutions; (Mention the initial solution here). You can use a diagram to clarify that with writing text
How you are going to do your research (step by step methodology is needed).
IV RESULTS (optional)
* You include the "Results" section, ONLY, if you have obtained your own results.
* You cannot include someone else’s figures or tables in this section. This is only your own analysis.
* Comprehensive Figure caption is needed.
7. Project Plan
The project will predict ……………
1. Deliverables (Annotated Bibliography, Journal Paper, Report, Seminar)
2. Work
eakdown structure (WBS)
3. Risk Analysis
4. Duration
5. Gantt chart
The above guidelines in step 7 is very important
*You must complete entire table for 12 weeks.
    Week
    Task
    1
    Obtained some knowledge about the research, e.g. how to read papers, how to evaluate papers
    2
    
    3
    
    4
    
    5
    
    6
    
    7
    
    8
    
    9
    
    10
    
    11
    
    12
    
Timeliness and completion of project proposal and plan.
8. References
Please use APA reference style. Minimum 5 references are needed
e.g.
Derwing, T. M., Rossiter, M. J., & Munro, M. J XXXXXXXXXXTeaching native speakers to listen to foreign-accented speech. Journal of Multilingual and Multicultural Development, 23(4), XXXXXXXXXX.
Thomas, H. K. (2004). Training strategies for improving listeners' comprehension of foreign-accented speech (Doctoral dissertation). University of Colorado, Boulder.
9. Appendix (if required)
1
Answered Same Day Dec 12, 2021 ITC571 Charles Sturt University

Solution

Deepti answered on Dec 14 2021
133 Votes
ITC571 - Project Proposal and Plan
IoT, IoE Security Using Blockchain
    Full Name
    
    Student ID
    
    Subject
    ITC571 – Emerging Technology and Innovations
    Assignment No
    Project Proposal and Plan
    Due Date
    13-Dec-2019
    Lecturer’s Name
    
Table of Contents
1. Introduction……………………………………………………………………3
2. Rationale……………………………………………………………………….3
3. Conceptual Framework………………………………………………………3-4
4. Methodology…………………………………………………………………4-5
4.1. Use of decentralized security in blockchain system……………….4
4.2. Authentication- Smart Contracts…………………………………..4
4.3. Encryption in distributed ledger of blockchain system…………….5
4.4. Ethical Issues………………………………………………………5
5. Project Plan………………………………………………………………………6-8
5.1. Work Breakdown Structure…………………………………………6
5.2. Risk Analysis……………………………………………………….7
5.3. Gantt Chart…………………………………………………………7
5.4. Compliance Requirements…………………………………………8
6. References…………………………………………………………………………..8
1. Introduction
Blockchain technology has been envisioned as a disruptive technology by researchers and it is the industry that assures management, control and primarily, security of IoT devices as stated in (Minhaj Ahmad Khan, 2017). A comprehensive system which is secure, efficient and reliable without incu
ing high cost is required for IoT security and it can be managed using block chain concept. This research describes how blockchain can be a key concept to provide viable security solutions to the challenging problems of IoT security in today’s scenario.
This research lays down the problem domain and purpose in section 2 to establish why security is necessary in the internet of things (IoT). It then discusses how IoT security can be achieved through blockchain technology in section 3. Section 4 highlights different ways which help in accomplishing the security of IoT using blockchain technology along with ethical issues that the proposed solution faces. Lastly, the research ends by laying out the project plan for the proposed solution followed during 12 weeks for the assignment.
Keywords: IoT security, Blockchain, Network security, Things
2. Rationale
The exponential increase in the internet-connected devices has changed the way the businesses and individuals interact with each other. This internet of things has contributed to the convenience, and efficiency with which the world is progressing. Its evident use in everyday life and rapid growth is due to innovative hardware techniques including improved bandwidth, machine-to-machine (M2M) and wireless sensor networks (WSN). This leads to various security issues related to such hardware techniques such as risk to privacy, confidentiality and integrity of data. The constrained frameworks require security solutions as small things (devices) with sensors have limited memory and power.
Blockchain can be used to solve various issues pertaining to IoT security problems. The research primarily focuses on how IoT security can be achieved through Blockchain technology and what robust solutions can be proposed to handle critical IoT security problems. A technology that ensures reliability and privacy is a cornerstone for growing environment of IoT. Block chain technology has come out as a promising solution to achieve the goals of acquiring reliable and secure IoT.
3. Conceptual Framework
The motivation for this research is mainly based on the vastness of the utility of IoT in the day-to-day dealings of households and businesses. The more one is dependent on interconnectivity, the more are they vulnerable to security threats and attacks. From digital assistants to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here