In week 3, we were supposed to prepare the project proposal and the plan. In the lecture, Dr. Manzoor educated us on how the plan and the proposal should be written. As I had already prepared the Abstract, it was convenient to make a good start to write the document.

Research Questions

This research will be carried out based on the following areas. These questions will be of assistance when evaluating and reviewing the articles and research papers already published.

  • Increasing the current security protocols to facilitate M2M communication by introducing an encryption mechanism
  • Managing the power consumption of IoT devices to facilitate the security protocols and encryption mechanisms.
  • Enhancing the connectivity range to facilitate long distant communication

Conceptual/Theoretical Framework

This research project will be based on Qualitative Theoretical Framework. Following are some of the important characteristics of this framework.

  • Clarifying qualities relating to theory of knowledge
  • Identifying rationale behind system of methods of choices
  • Building theories using research findings

This framework is based on concepts, references and definitions relevant academic publications, theories that are currently used in a particular area of research. Qualitative Theoretical Framework assists in understanding theories that are related to this research since existing research papers will be referred when carrying out this research project.

Research Methodology

In this research project, journals and articles relating to the topic that is selected will be collected. After a thorough analysis of these articles and journals, issues and challenges that have been identified in those existing articles and researches will have to be a reviewed. Some findings will be discussed with the supervisor to clarify doubts and issues and feedback will be taken for improving the research project further. Following are some of the research papers relating to the research that is already selected. Also, APA referencing guidelines will be used in referencing the articles.

Ali, I., Sabir, S., & Ullah, Z. (2020). Internet of Things Security, Device Authentication and Access Control: A Review. Retrieved 5 April 2020, from https://arxiv.org/abs/1901.07309

Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues – IEEE Journals & Magazine. (2020). Retrieved 5 April 2020, from https://ieeexplore.ieee.org/abstract/document/7005393/

Work Breakdown Structure (WBS)

Work Breakdown Structure was developed by breaking the tasks into sub tasks using Microsoft Project.

Gantt Chart

Gantt Chart shows both tasks and the timeline each task is allocated.