INTERNET OF THINGS R16 Nov 2019
INTERNET OF THINGS R16 Nov 2019
6. a) Describe the secure authentication and access control in constrained devices. [7M]
b) Explain the data acquiring and storage mechanism for IoT. [7M]
7. How to use a service platform while developing IoT applications? Explain with [14M]
respective to Xively cloud service.
*****
||''|''||''|''|||'||