Finish Methodology for my research topic RFID security on IOT

User Generated

Fueniv_1990

Programming

JNTU

Description

Need to write the methodologies for my research topics RFID Security on IOT.

I'll provide the attachments required. It should be 1200-1400 words in IEEE format.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello there,Find the attachment.Feel free to ask for any editings

Outline: Research Methodology
i.

Introduction

ii.

Research Design

iii.

Population and sampling
a. Population
b. Sampling design
1. Sampling frame
2. Sampling Technique
3. Sample size

iv.

Data collection methods

v.

Research procedures

vi.

Data analysis Methods

vii.

Chapter summary

viii.

References


Running Head: RFID NETWORK SECURITY

RFID Network Security
Student Name
University Affiliation
Date of Submission

1

RFID NETWORK SECURITY

2
Research Methodology

Introduction
The research methodology will be used to show the approach and methods that the
researcher will use throughout the research. The methodology shows the study design that the
study will use, the population, sample design, the process for data collection, the procedure of
research, and the analysis of data, showing the tool that will be used to analyze the data and come
up with solutions to the study.
Research Design
Research design shows the actual blueprint that the researcher will use to incorporate the
elements of the study reasonably so that the research questions can be answered adequately [3].
The various forms of research design include experiments, grounded theory, action, archival,
descriptive survey, and ethnography [4]. The research focuses on identifying solutions to the
problems associated with RFID security. Hence, the best design is action design. However, some
forms of ground theory will be used since the research also focuses on using secondary sources to
gather information.
Action research design is regarded as educational research that focuses on collecting
various information that is about the current needs. The primary purpose of action research is to
improve the working of a particular variable under study so that it focuses on the ideas of the
prevailing views. The action research design involves interactions that will be carried out
repeatedly to ensure that the solution that is achieved and fits the needs of the problem. The
solution that the action research design reaches is deemed to be a permanent solution to the
problem [3].

RFID NETWORK SECURITY

3

In addition to that, the action research plan will be used to educate various sectors such as
the government agencies and the public on the importance of understanding multiple network
security measures and how different vendors come up with their security measures [5]. The
methodology focuses on coming up with a data security system that will remedy the personal
privacy risks. The approach displays the best ways organizations can use so that they mitigate the
hacking that has prevailed in recent years.
In the grounded research design, the study will examine the journals, book sections,
publications, and literature review to acquire relevant data on the research problem. These
materials are luxurious with pertinent information that is useful for this research. The study will
focus on the methods that are explained in these materials, the strengths, and various limitations
of providing information on network security.
Population and Sampling Design
Population
The population in research is said to be targeted respondents that the sample of the study
will be obtained [3]. The population features objects, individuals, items or events, and other
measurements. The population is composed of various subjects that have similar features that are
under study. The population of the research will be composed of organizations that use RFID to
manage various information. In addition to that, the population will also consist of various case
studies that examine network secu...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags