Wireless Networks and Security (MN603 Assessment-2) Assignment Help

Assessment Details and Submission Guidelines

Trimester 

T2 2024

Unit Code 

MN603

Unit Title 

Wireless Networks and Security

Assessment  

Type

Assignment 2 (Group assignment, 3-4 members per group)

Assessment  

Title

Implementation of Wireless networks and performance evaluation

Purpose of the  assessment  

(with ULO  Mapping)

The purpose of the assignment is to compare NS3 simulators with other current  network simulators. Developed, modified and studied wireless routing protocols  performance with NS3 simulator. Design and implement Wireless Local Area  Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient  and secure data transmission. 

Students will be able to complete the following ULOs: 

Analyze and compare wireless communication protocols.  Compare standard-based technologies used in various networks.  Test and evaluate various wireless networks performance. 

Weight 

20%

Total Marks 

60

Word limit 

2500-3500

Due Date 

Week 11; 27/09/2024

Submission  

Guidelines

All work must be submitted on Moodle by the due date along with a  completed Assignment Cover Page.  

The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)  font and 2 cm margins on all four sides of your page with appropriate section  headings.  

Reference sources must be cited in the text of the report and listed  appropriately at the end in a reference list using IEEE referencing style.

Extension 

If an extension of time to submit work is required, a Special Consideration  Application must be submitted directly on AMS. You must submit this  application three working days prior to the due date of the assignment.  Further information is available at:  

https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy

Academic  

Misconduct 

Academic Misconduct is a serious offense. Depending on the seriousness of  the case, penalties can vary from a written warning or zero marks to exclusion  from the course or rescinding the degree. Students should make themselves  familiar with the full policy and procedure available at 

For  further information, please refer to the Academic Integrity Section in your  Unit Description.


Use of 

Generative 

Artificial 

Intelligence 

(GenAI) in 

Assessments

More information about the use of Gen AI in student assessment can be  found in the full policy and procedure available at: Further support can be found in the  

Further details on the type of assessment tasks, and whether Gen AI is permitted to be used or not are provided in the assessment brief.

Artificial 

Intelligence 

(AI) Score  

Limit.

Not acceptable AI score more than 30%. Please check your assignment  AI score before submission.


Assignment Description 

This assignment consists of three tasks.  

Task 1 Study and analysis two network simulation software tools. Study the latest version of the NS3  simulator tool. Describe the new API and model change history of NS3. 

Task 2. Involving analysis and modification of the NS3 lab exercises code. Task 3 It is a case study task. You need to analyze and answer three specific questions.  

[Total Marks 55]  

________________________________________________________________________________

Task1 [Marks 10+10=20]    

Q1. Explore and analyze the following network simulator and write a short comparative study  report.  

NS3 

NS2 

Q2. What is the latest version of NS3 simulator? What new features are added in the latest version  of the NS3 simulator? Write a short report on the Changes from NS-3.38 to the latest version of NS3  simulator. Describe the new API and model change history of NS3. 

______________________________________________________________________________

Task 2 [Marks 15]   

Q2. Write a Multihop Ad Hoc wireless networks program for simulating in the NS3 simulator. Name  the program as your group number. Your program should generate 5 packet captured files. Also  give the name of the xml file as “Your Group name.xml.” Execute the program and execute NetAnim  for visualization of the performance of your Multihop Ad Hoc program. Take a screenshot of the  created .xml file in the NetAnim display. Screenshot of 5 packet captured files that your program  generates. Attach the code of your program in the submission report particularly 5 packet  captured generation code.  

[Hints: You can use Lab-3 task (aodv.cc) program and modify it according to the Task2]

________________________________________________________________________

Task 3 [Marks 25]  


Q3. Case Study:  

Many wireless devices use wireless technology, yet they lack the necessary security protections. In  an Australian Information Security Association (AISA) members gathering in Melbourne a security  researcher, who has himself a diabetic, demonstrated a wireless attack on an insulin pump that  could change the delivery of the patient. In this gathering another AISA member who is a security  vendor found that they can scan a public space from up to 91 meters (300 feet) away, find  vulnerable pumps made by a specific medical device manufacturer, and then force these devices to  dispense fatal insulin doses. 

Based on the above scenario, write a short report and answer the following questions:  a) Conduct research on the current state of the attacks on wireless medical devices and proposed  defenses to mitigate the attack.  

b) Should the vendors who make this wireless medical device be forced to add security to their  devices? What should be the penalty if they do not?  

c) As per Australian cyber security laws, what should be the penalty for an attacker who  manipulates a wireless device.  

  

Source: Book: Security Awareness: Applying Practical Cybersecurity in your world, Mark Ciampa, Cengage.

————————————————-:End of Task:—————————————————

Marking Guide 

Section to be included in the report 

Description of the section 

Marks

Task-1: 

Q1. Explore and analyze NS2 and  NS3 network simulators and write a  short comparative study report. Q2. What is the latest version of  NS3 simulator? What new features are added in the latest version of the  NS3 simulator? Write a short report  on the Changes from NS-3.38 to  latest version of NS3 simulator.  Describe the new API and model  change history of NS3.

Q1. Detail Comparative study report  on NS2 and NS3 Network simulators. Each simulator description in the  study will be 5 marks each.  

Q2. Correct and appropriate answers  to this question. 10 marks.

5+5+10=20

Task-2: NS3 Simulation 

Correctly written the Multihop  Ad Hoc wireless networks program for  generation of 5 packets captured files and appropriately created .xml file. Provided codes.

15

Task-3: Case Study 



Introduction 

Introduction 

2

Conduct research on the current state  of the attacks on wireless medical  devices and proposed defenses to  mitigate the attack. 

Research the current state of the  attacks on wireless medical devices  and proposed defenses to mitigate  the attack. 

10

Should the vendors who make this  wireless medical device be forced to  add security to their devices? What  should be the penalty if they do not? 

Appropriate answers on question  part b.

4

As per Australian cyber security laws,  what should be the penalty for an  attacker who manipulates a wireless  device.

As per Australian cyber security laws,  currently explained the penalty for  an attacker who manipulates a  wireless device. 

3

Conclusion 

Write a summary of the report  highlighting the positive and negative  points.

2

Reference style 

Follow the IEEE reference style.  Reference should be cited in the body  of the report.

2

Format of the report 

Report Layout and Format. Format  must look professional. 

2


Marking Rubric for Assignment #2: Total Marks 60

Grade 

Mark

HD 

80-100

70-79

CR 

60-69

50-59

Fail 

<50


Excellent 

Very Good 

Good 

Satisfactory 

Unsatisfactory

Task 1






Written  

comparative  

study report on  NS2 and NS3 

network  

simulators. /20

Explored, studied,  and compared their  features on NS2  

and NS3 simulators.

Relevant and  soundly  

analyzed  

and wrote a comparative  study report.

Generally  

relevant and  

comparative  

study reported.

Comparative  

study reported  but not up to  

the standard. 

Comparative  

study report is  poorly written

Task 2  

NS3  

Simulation/7

Correctly written  the Multihop  Ad Hoc wireless  networks program  using and  generated 5 packet  capture files. 

Provided codes.

Very good.  Written the  Multihop  

Ad Hoc 

wireless  

networks  

program and  generated 5 packet  

capture files. Provided  

codes.

Good in writing  the Multihop  Ad Hoc wireless  networks  

program.  

generated 5 packet capture  files. Provided  codes.

Satisfactorily  

writing the  Multihop Ad Hoc wireless  

networks  

program.  

Generated packet capture  files. Provided  codes but hard  to find the  location where  change has been  done.

Poorly or not  

attempt writing  the code. 

Task 2  

NS3  

Simulation/8

Appropriately  

created .xml file.  And generated 6  packets captured files. Provided Valid  Screenshots. 

Created .xml file. And  generated  

packets  

captured 

files.  

Provided  

relevant  

screen shots. 

Properly named  the  

.xml file. And  

generated  

packets  

captured files.  Provided  

relevant visible  screen shots

Satisfactorily 

named the  

.xml file. And  

generated  

packets  

captured files.  Relevant screenshots are not  

clearly visible

Poor  

screenshots.  

Hard to find the  .xml 

File. No output  of the screen  

shots.

Task 2  

Case study 






Introduction/2 

All topics are  

pertinent and  

covered in depth. 

Topics are  

relevant and 

Generally  

relevant and  

analyzed.

Some relevance  and briefly  

presented.

This is not  

relevant to the 



Ability to think  

critically and source  material is  

demonstrated

soundly  

analyzed.



assignment  

topic.

Research the  

current state of  the attacks on  wireless medical  devices and  

proposed  

defenses to  

mitigate the  

attack./10 

Demonstrated  

excellent ability to  think critically and  present an  

exceptional  

research report and  attack mitigation  techniques.

Demonstrate 

ed good  

ability to  

think  

critically and  present a  

research  

report and  

attack  

mitigation  

techniques.

Demonstrated  good ability to  think critically  and present a  good research  report and  

attack  

mitigation  

techniques.

Demonstrated  ability to think  critically and  

present a fair  

research report  and attack  

mitigation  

techniques.

Did not 

demonstrate 

ability to think 

critically and 

present poor  

research report  and attack  

mitigation  

techniques.

Should the  

vendors who  

make this  

wireless medical  device be  

forced to add  

security to their  devices? What  should be  

penalty if they  do not? /4

Excellently  

proposal for dog  vendor penalty 

Very good  

proposal for  dogy vendor  penalty 

Good proposal  for dogy vendor  penalty 

Fair proposal for  dogy vendor  

penalty . 

Poor proposal  for dogy vendor  penalty .

As per  

Australian cyber  security laws,  

what should be  the penalty for  an attacker who  manipulates a  wireless  

device./3

Excellent strategy  for an attacker who  manipulates a  

medical wireless  

device. 

Very good of  your proposed  strategy for  an attacker  

who  

manipulates  a medical  

wireless  

device.

Good strategy  for an attacker  who  

manipulates a  medical  

wireless device.

Fair strategy of  for an attacker  who  

manipulates a  

medical wireless  device.

Not relevancy of  your prosed 

strategy for an  attacker who  

manipulates a  medical wireless  device.

Conclusion/2 

Excellent summary  of the report  

highlighting all the  positive and  

negative points

Very good  

summary of  the report  

highlighting  most of the  positive and  negative  

points

Good  

summary of the  report  

highlighting  

significant  

number of the  positive and  

negative points. 

Fair summary  of the report  

highlighting a  

few numbers of  the positive and  negative points.

Poor summary  of the report.  

Failed to be  

highlighting  

positive and  

negative points.

Reference  

style/2

Clear styles with  

excellent source of  references. Cited  well in the body of  the report. 

Clear  

referencing  

style and  

cited in the  

body of the  report.

Generally good  referencing  

style

Sometimes clear  referencing style

Lacks  

consistency  

with many  

errors

Format and the  report Layout. 

/2

Exceptional report  layout, style and  

language used

Very good  

report  

layout, style  and 

Good report  

layout, style  

and language  

used

Acceptable  

report layout,  

style and  

language used

Poor report  

layout, style and  language used




language  

used