Q1 Smart Sensor Network

download print

About this sample

About this sample


Words: 2037 |

Pages: 4|

11 min read

Published: Jun 5, 2019

Words: 2037|Pages: 4|11 min read

Published: Jun 5, 2019

Table of contents

  1. Q2 Wi-Fi infrastructure
  2. Q3 Role of digital identity in ensuring privacy
  3. Q3 Personal digital security

According to me sensor network is a system that responds and senses some type of input from both the physical or environmental conditions outputs an electrical signal that is transmitted to a controller for further processing and I believe that the Smart State Plan provided by the Australian state government help all the sections of the society to analyse the information security and privacy implications on their business. The system effects standard is aimed at serving the medical, industrial and environmental challenges. Sensor applications in multiple fields such as smart power grids, smart buildings and smart industrial process control significantly contribute to the more efficient use of resources. Security and surveillance use sensor networks facilities in the military and defence area. Sensor networks are used in multiple ways in the healthcare sector such as tracking the activities of patients and doctors, drug management and diagnostic applications. I believe the sensory networks are also used for structural strength monitoring of big civil or urban structures. Sensory networks are effectively used in mesh networking. Sensory networks also decrease the need for physical cables for data transmission. I believe that the concept of smart cities can be achieved with the help of sensory networks. According to me, sensory networks have a direct impact on the lifestyles of people living in them. Intelligently planned systems help in cumulating worker efficiency, energy cost savings and organizational savings.

'Why Violent Video Games Shouldn't Be Banned'?

The criminal activities can also be checked with the active use of the different types of sensory networks. Citizens can be provided more security by installing more cameras to read license plates and track the vehicles who are disobeying the traffic regulations. Investigation of any crime can be checked by mobile sensors it involves the packing and retrieval of sensed data. Application of sensory network is used to support disabled people, providing safe, secure and empowering surroundings. The networks can allow the user to control many features or automate them and the environment can also be checked by the smart home system sensory network to ensure safety and alert people when there is some unsafe condition. I believe that sensory networks provide great facilities to the disabled persons who do not have arms or hands. Due of their inability, they fail to reach the key to open and lock the door of their house but with the help of advanced systems, they can recognize the person who approaches to the door and decide whether to open or not open the gate according to the identity of the person. The applications of several sensory networks had a direct impact on the life of citizens of Singapore providing them with more security and guide them for the overall improvement of their nation. I think the security of the people has increased to a greater extent with the use of systems such as advanced cameras in every corner of the streets but it also involves few ethical issues like hacking which needs to be sorted so that the efficiency of the system is maintained. The other prime ethical issues are the data of the security of the citizens. The main issue is the safety of this data collected by the smart sensors for the citizens. The security of that data is in doubt as this might can be hacked. Successful hacking of those data can expose the vulnerability of any individual citizen to the hackers. I think the extensive use of sensory networks makes the city safer at late nights. It helps to maintain the protocols and develop a perfect approach to face any kind of situation according to the requirement. I believe the automobile users install wireless connectivity in their cars which enable communications both with roadside base stations and between vehicles for the purposes of security, driving assistance and entertainment. Summarising the topic, I would like to say that sensory networks provide the most advanced monitoring solutions helping them to be more secure.

Q2 Wi-Fi infrastructure

According to me the Wi-Fi technologies are extensively adopted and play a significant role in increasing the life quality of people it is helpful in empowering the city with better services and facilities. I think smart waste management, smart security and smart lighting in public places are relying on cloud Wi-Fi infrastructure. The smart Wi-Fi network helps all the citizens who can’t afford internet facilities at home as they can enjoy a free internet connection and use them for various types of purposes like access in public services, searching for jobs and personal entertainments. I think that Wi-Fi infrastructure helps the people for more online shopping rather the conventional shopping techniques as people might like to enjoy various services at sitting in their home. There can be many changes which can be observed by the effective application of free Wi-Fi hotspots such as people can have much improved travelling plans with real-time information about transports by using the Wi-Fi hotspots. Public Wi-Fi access can have a huge impact on the tourism industry as tourists always want to stay associated with their family and friends share their moments on their social networks and check the travel information. As a result, they are more incentivized to travel to such a location having free public Wi-Fi. I believe that every nation with free Wi-Fi hotspots would be advantageous both for the travellers who would appreciate internet connection without roaming charges and also for the local public for facing a large profit from enlarged levels of tourism. I believe that student and teachers can also effectively use Wi-Fi enabled systems for educational purposes and the institutions can also develop advanced education methods based on collaborative and interactive knowledge. I think there will be significant improvements in the sales in retail stores, restaurants, bars, salons, hotels and shopping malls who provides free Wi-Fi connection to their customers. Many behavioural changes should be observed among the peoples for using the internet extensively like instant chat or email their family and friends all around the globe. International friendships will be made easier, online dating will be more practised and people should be able to create their own websites according to the requirements. For me, the main problems with public Wi-Fi are the tremendous number of risks that go along with those networks; I guess we should not allow the public internet connection to get auto-connected to our systems as it may have a negative impact on the important data and information on our system. After using the free network, the connection should be interrupted so that there is no chance for any external threats to access the system. I believe the file sharing options on the mobile phones should always be activated so that when needed they can be deactivated and made for use. I believe that the biggest risk of using free Wi-Fi is security as the hackers positions themselves between me and my connection points. I would personally recommend the use of a VPN connection when connecting to an unsecured connection like a public Wi-Fi hotspot. It will provide us with more security from the external threats even if the hacker position himself between the two systems hence our data here will be strongly encrypted. We should preferably use the websites with https in front of the URL for safety reasons. The free connection should be off when we are not accessing the internet as it will help them to restrict the unauthorized access of the threats. I always enable my inbuilt security systems.

Q3 Role of digital identity in ensuring privacy

According to me the digital identity one an individual is a set of attributes allowing a third party to asses and verify the authenticity of the identity in question and the claims being made by it. It is the intersection of identity and technology and the most defining factor in digital identities is that they’re permanent. I believe that the role of digital identity is progressively an attention of the policy negotiations across different countries with a number of governments suggesting or implementing national digital identity programmes, governments intends to provide a single digital identity to every citizen of a particular nation for more precise and efficient delivery of government facilities. According to me the use of digital identity would assist me to maintain my privacy while using my personal devices in many ways. I believe that every industry needs an identity declaration for its commercial enterprises such as e-Commerce, online banking and trading. It helps to keep our uniqueness and maintaining the infrastructure of the country in a secure way as we can see that identity burglary and other online criminal activity is a rising anxiety for citizens, governments and enterprises as financial, emotional and practical costs are at stake and growing every year. Digital identities are easy to exploit and highly profitable, the other importance of digital identity includes its helping abilities in businesses to understand their clients better without interacting with them face-to-face and establish lasting relationships with them. It is useful in attracting and retaining customers and delivering new levels of value and growth. I believe the use of digital identity is helpful in tracking data breaches and the exposure of personal information. The fundamental value to one’s digital identity is Trust. In the real world I found that an individual is able to effortlessly authorize their uniqueness by presenting documents such as an ID or driver’s license that are issued by authorities based on verifiable information provided by that individual and these authorities are reliable the documents they issue can be used by the individual to verify their identity with many diverse organizations that might be offering services.

Get a custom paper now from our expert writers.

Q3 Personal digital security

According to me, there are several effective ways in which our personal data can be kept securely on our mobile devices. Cyber criminals are able to access our personal information online through there unethical methods to stop that we need to secure our systems by using a strong password with special characters but there is a drawback of that procedure as forgetting that password will creating more complexity for us. Choosing a unique security question in any social media platforms provides security to the accounts but forgetting those lead us to the password recovery mode which is a time consuming task. I would recommend of modern platforms like Gmail provides a double verification process which is considered a very safe and unique method of data protection but it has a disadvantage of accessing two devices at a time. I believe our mobile phones should be secured with both internal and external security software which helps to restrict the unauthorized users in our system but it is often found that the software decreases the efficiency of the mobile as it slows down the overall performance. We should avoid clicking unfamiliar links in spite of knowing its importance in order to protect the data on a long-term basis. I think that the practice of using private browsers should be encouraged in spite of knowing that the data could never be retrieved. We should avoid giving our banking details in an e-commerce transaction from our mobile as they are a disadvantage of money deductions in the future. Automatic software updating should be activated on our mobile phones which are very much recommended for various types of security reasons. Installation of the Operating system updates is necessary as it updates the in-built security systems of our mobiles but it may have a negative impact such as the improper functioning of any software due to compatibility issues. I believe that we all should read the policies of the software before installing them in our mobile phones it may be a time consuming affair but it is important to know how it uses the information and whether it delivers information to third parties or not. I would like to recommend having different passwords for banking, social media, email even if it is difficult to remember them as a hacker only needs to figure out just one password to gain access to all the forums. We should set up login notifications in our mobile phones for platforms like Facebook which will allow us to receive a text message whenever an unrecognized IP address logs in to the account.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

Q1 Smart Sensor Network. (2019, May 14). GradesFixer. Retrieved May 21, 2024, from
“Q1 Smart Sensor Network.” GradesFixer, 14 May 2019,
Q1 Smart Sensor Network. [online]. Available at: <> [Accessed 21 May 2024].
Q1 Smart Sensor Network [Internet]. GradesFixer. 2019 May 14 [cited 2024 May 21]. Available from:
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled


Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.


    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts


    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.



    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!


    Get Your
    Personalized Essay in 3 Hours or Less!

    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now