Wireless networks analysis, challenges, techniques and

Assignment Detail:- MN603 Wireless Networks and Security - Melbourne Institute of Technology Assessment - Wireless networks analysis, challenges, techniques and recommendations Purpose: The purpose of the assignment is to implement wireless networks in Simulation environment and analyse the routing protocols, evaluate them in terms of security, QoS, and energy efficiency- Students will be able to complete the following ULOs:a- Analyse and compare wireless communication protocols;b- Apply and evaluate wireless network security techniques with consideration of ethical implications;c- Design and implement secure enterprise wireless networks Assignment Description Parts: There are two parts to this assignment, i-e-, part A and part B-A- Write a group report on one of the following topics listed in Part A- Your tutor will allocate you a group number -maximum of five students in a group- and your topic- -65 Marks-B- Demonstration- Make a group video demonstration of three wireless security tools- Topic 1 - Wireless Security: Challenges, Approaches and Future Trends Increasingly, organisation's are using wireless technology for vital communications they want to keep private, such as mobile e-commerce transactions, email, and corporate data transmissions- The open communications environment makes wireless transmissions more exposed than wired communications to malicious attacks- Write a research survey of the Wireless Security challenges and analyze their most recent solutions and developments- Your article should cover the following points: • Background of the Wireless security• Describe the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues-• Overview of security attacks encountered in wireless networks-• The contrast between wireless usage and security standards-• Challenges involved in wireless communications-• Overview of security issues, i-e-, attacks, vulnerabilities, and threats in wireless networks• Provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution -LTE- systems-• Make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology-• Compare wireless security techniques• Discuss the security approaches for the various wireless technologies- Topic 2 - IoT Network: Challenges, Security Threats and approachesIn recent years, the development of the Internet of Things technology has been very rapid- However, with the explosive growth of IoT devices, the challenges facing the IoT environment are becoming more and more serious- How to ensure the security of the IoT becomes a key issue- Write a research survey of the IoT network challenges and analyze their most recent solutions and developments- Your article should cover the following points: • Background of the IoT security-• Overview of IoT application domains and discusses the most important wireless IoT protocols • Describe the security requirements of IoT networks, including their authenticity, confidentiality, integrity, and availability issues-• Overview of security attacks encountered in IoT networks-• Discuss the security issues in IoT applications-• Review the threat challenges and IoT security models at each level of the Internet of Things• Overview of security issues, i-e-, attacks, vulnerabilities, and threats in IoT networks-• Provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures-• Provide the recommendations to improve the IoT infrastructure- Instructions: Prepare your article as below 1- Complete the assignment -minimum 6 and maximum 19 pages- including all the sections below- The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties-• Title -maximum 15 words-• Abstract -200 - 250 words-• Introduction -800 - 2000 words-• Literature Review -1000 - 4000 words-• Main body -1000 - 3000 words-• Conclusion -200 - 300 words-• Future Works -150 - 300 words-• References -minimum 10 references-2- The article must be a ‘Review'1 article, including at least 5 references and not more than 25-3- Strictly follow the IEEE reference format for in-body citations and the references section-4- See the attached files for guidance on how to prepare a review paper- You can also find thorough instructions from IEEE and the Internet- Part B description: Make a group video demonstration of three wireless security tools such as Kismet, Reaver, InSSIder and SolarWinds WiFi network analyzer- Prepare slides -between 8 - 12 slides- for your video demonstration- As a team of five, create a 5-8 minutes video demo using the Zoom application -along with the presenters' video- addressing the following tasks:1- Analyse and discuss the importance of your selected wireless security tools2- Perform three selected wireless security tools3- Identify and discuss the strengths and weaknesses of each wireless security tools4- Which wireless security would you recommend???? Justify your recommendation Attachment:- Wireless Networks and Security-rar




Most Recent Questions

Captcha

Helping Students for Excellence in Academics, GET Help with Assignment? Order Now