Professional Documents
Culture Documents
Session 13
Session 13
15.4.2020
UNIT: 5: Security
PLAN:
Follow-Up Activity
Try to think about the security steps that you have just learned.
5. Why should you avoid using your name, address, or birthday as your
password?
6. What should you do if you think someone else knows your password?
8. In your opinion, why do you think some people would intentionally harm
9. Why is it not a good idea to store your back-up copy of a file on the same
11. If a Web site asks you to type in personal information....what should you
do?
12. Why should you not open files or email from people that you do not
know?
14. How do kid-friendly search engines help you find things on the WWW
more quickly?
Web site?
TOPIC 2: Security Attacks in Sensor Networks, Zig Bee Security 4 Flipped videos - Time
11.26 -11.40 am
MCQ- Security Attacks in Sensor Networks, Zig Bee Security: Min 15 questions: Time 11.40
– 11.55 am
TOPIC 3: Protocols and Mechanisms for Security, IEEE 802.15.4 Security 2-Flipped videos-
Time 12.11-12.20 pm
MCQ - Single Protocols and Mechanisms for Security, IEEE 802.15.4 Security Min 15
questions: Time 12.21 – 12.40 pm
Activity: Protocols and Mechanisms for Security, IEEE 802.15.4 Security Time 12.41 – 1.00
pm
If a student wears Blue Pant with Green Shirt then it indicates 6LoWPAN network over
802.15.4
If a student wears Blue Pant with Yellow Shirt then it indicates Wireless HART network
over
802.15.4.
If a student wears Blue Pant with Pink Shirt then it indicates Zigbee network over 802.15.4.
(Assume you are wearing any of the above combination of dress- which indicates you have
selected a particular network)
So every student should select any one of the above given wireless network with
IEEE802.15.4 as the Physical and Data link layer and should describe the functionality,
compatibility issues and applications.
.
Class summary: Time: 1.00-1.10 pm
STUDENTS 1 -5:
1, Assume a Low rate Personal area Network satisfying IEEE 802.15.4 Standard has to be
setup in the Home environment. Justify which version of IEEE 802.15.4 (IEEE802.15.4,
IEEE 802.15.4 a, IEEE 802.15.4 b, IEEE 802.15.4 c………. IEEE 802.15.4 g) to be used for
theHome network by giving the comparison table specifications of all the versions.
[Note: * Upper Layer services can be either Zigbee or 6LoPAN * Country for India]
STUDENTS 6- 10:
1.Explain some of the characteristics of a WSN that make routing security difficult to
implement.
STUDENTS 11 -15:
1.What is a man-in-the-middle attack? Can you imagine a concrete WSN scenario where
2.What are the security models provided by IEEE 802.15.4? What is the purpose of the
STUDENTS 16 -20:
.**************************************************