MN603 Wireless Networks and Security

MN603 Wireless Networks and Security


 



























Assessment Details and Submission Guidelines
TrimesterT2 2018
Unit CodeMN603
Unit TitleWireless Networks and Security
Assessment

Type
Individual Assignment 1
Assessment

Title
Evaluation of LTE/LTE-A Network Security
Purpose of the assessment (with          ULO Mapping)The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:

b.  Compare standards-based technologies used in various networks;

c.  Test and evaluate various wireless networks performance;
Weight10%
Total Marks50
Word limit1500 – 2000 words
Due Date2/9/2018 11:55PM
Submission Guidelines·      All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.

·      The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.

·      Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension·      If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:

http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct·      Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar         with    the          full      policy             and                  procedure       available           at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-

Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.

 

Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey” [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:
  1. Comparison of the existing cellular networks generations in terms of:

  2. Communication spectrum

  3. modulation techniques

  4. medium access control mechanism

  5. Network speed and bandwidth utilization

  6. Security techniques and risk


 
  1. Explore the architecture of LTE/LTE-A

  2. Evaluate the LTE/LTE-A attacks on the access and core

  3. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such

References

[1]        L. He, Z. Yan and M. Atiquzzaman, "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey," in IEEE Access, vol. 6, pp. 4220-4242, 2018.

Marking criteria:

 






























Section to be included in

the report
Description of the sectionMarks
IntroductionOutline of the report ( in 3-4 sentences)4
Report LayoutReport layout, style and language5
Comparison of cellular networksComparison    of    the    existing    cellular   networks generations in terms of:

 

a.      Communication spectrum

b.      modulation techniques

c.       medium access control mechanism

d.      Network     speed     and     bandwidth utilization

e.        Security techniques and risk
20
LTE/LTE-A ArchitectureExplore the LTE/LTE-A architecture5
Evaluation of LTE/LTE-A Attacks on access and

core networks
Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive.10
Identification and AnalysisIdentify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack.7
ConclusionWrite summary of the report4
Reference styleFollow IEEE reference style5
 Total60
 

Marking Rubric for Assignment #1: Total Marks 50






























Grade MarkHD 48-60DI 42-47CR 36-41P 30-35Fail

<30
 ExcellentVery GoodGoodSatisfactoryUnsatisfactory
Introduction

 

/4
All topics are pertinent and covered in depth. Ability to think critically and source material is

demonstrated
Topics are relevant and soundly analysed.Generally relevant and analysed.Some relevance and briefly presented.This is not relevant to the assignment topic.
Report Layout

 

/5
Exceptional report layout, style and language usedVery good report layout, style and language

used
Good report layout, style and language usedAcceptable report layout, style and language used.Poor report layout, style and language used.
Comparison of cellular networks

/12
Finding is clearly linked and well justifiedFinding is clearly linked and justifiedFinding is linked and convincingFinding is not linked and unjustifiedFinding is not available

 

 






























LTE/LTE-A

Architecture

 

/5
Excellent understanding of LTE/LTE-A

Architecture
Very good understandi ng of LTE/LTE-A

Architecture
Good understanding of LTE/LTE-A

Architecture
Demonstrated adequate understanding of LTE/LTE-A

Architecture
Poor understanding of LTE/LTE-A

architecture
Evaluation of LTE/LTE-A

Attacks on access and core networks

/10
Exceptional evaluation of LTE/LTE attacks on access and core networksGood evaluation of LTE/LTE attacks on access and core

networks
Evaluation of LTE/LTE attacks on access and core networksEvaluation of a few LTE/LTE attacks on access and core networksUnable to evaluate LTE/LTE attacks on access and core networks
Identification and Analysis

 

 

/7
Identified the attack and provided excellent justificationIdentified the attack and provided good

justification
Identified the attack and provided valid justificationIdentified the attack and failed to provide valid justificationFailed, to identify the attack and provide justification
Conclusion

 

/4
Logic is clear and easy to follow with strong argumentsConsistency logical and convincingMostly consistent logical and

convincing
Adequate cohesion and convictionArgument is confused and disjointed
Reference style

 

/5
Clear styles with excellent source of references.Clear referencing styleGenerally good referencing styleSometimes clear referencing styleLacks consistency with many errors

 

Comments

Popular posts from this blog

ACC030243 Corporate Governance SCU Assignment 2

Accounting Assignment Solution

CSG1207 | DATABASE DESIGN AND IMPLEMENTATION ONLINE STORE