Wireless Networks and Security (MN603 Assessment-2) Assignment Help

Assessment Details and Submission Guidelines

Trimester

T2 2024

Unit Code

MN603

Unit Title

Wireless Networks and Security

Assessment

Type

Assignment 2 (Group assignment, 3-4 members per group)

Assessment

Title

Implementation of Wireless networks and performance evaluation

Purpose of the  assessment

(with ULO  Mapping)

The purpose of the assignment is to compare NS3 simulators with other current  network simulators. Developed, modified and studied wireless routing protocols  performance with NS3 simulator. Design and implement Wireless Local Area  Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient  and secure data transmission.

Students will be able to complete the following ULOs:

• Analyze and compare wireless communication protocols.  • Compare standard-based technologies used in various networks.  • Test and evaluate various wireless networks performance.

Weight

20%

Total Marks

60

Word limit

2500-3500

Due Date

Week 11; 27/09/2024

Submission

Guidelines

• All work must be submitted on Moodle by the due date along with a  completed Assignment Cover Page.

• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)  font and 2 cm margins on all four sides of your page with appropriate section  headings.

• Reference sources must be cited in the text of the report and listed  appropriately at the end in a reference list using IEEE referencing style.

Extension

• If an extension of time to submit work is required, a Special Consideration  Application must be submitted directly on AMS. You must submit this  application three working days prior to the due date of the assignment.  Further information is available at:

https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy

Academic

Misconduct

• Academic Misconduct is a serious offense. Depending on the seriousness of  the case, penalties can vary from a written warning or zero marks to exclusion  from the course or rescinding the degree. Students should make themselves  familiar with the full policy and procedure available at

For  further information, please refer to the Academic Integrity Section in your  Unit Description.

 

Use of

Generative

Artificial

Intelligence

(GenAI) in

Assessments

• More information about the use of Gen AI in student assessment can be  found in the full policy and procedure available at: Further support can be found in the

• Further details on the type of assessment tasks, and whether Gen AI is permitted to be used or not are provided in the assessment brief.

Artificial

Intelligence

(AI) Score

Limit.

• Not acceptable AI score more than 30%. Please check your assignment  AI score before submission.

 

Assignment Description

This assignment consists of three tasks.

Task 1 Study and analysis two network simulation software tools. Study the latest version of the NS3  simulator tool. Describe the new API and model change history of NS3.

Task 2. Involving analysis and modification of the NS3 lab exercises code. Task 3 It is a case study task. You need to analyze and answer three specific questions.

[Total Marks 55]

________________________________________________________________________________

Task1 [Marks 10+10=20]

Q1. Explore and analyze the following network simulator and write a short comparative study  report.

• NS3

• NS2

Q2. What is the latest version of NS3 simulator? What new features are added in the latest version  of the NS3 simulator? Write a short report on the Changes from NS-3.38 to the latest version of NS3  simulator. Describe the new API and model change history of NS3.

______________________________________________________________________________

Task 2 [Marks 15]

Q2. Write a Multihop Ad Hoc wireless networks program for simulating in the NS3 simulator. Name  the program as your group number. Your program should generate 5 packet captured files. Also  give the name of the xml file as “Your Group name.xml.” Execute the program and execute NetAnim  for visualization of the performance of your Multihop Ad Hoc program. Take a screenshot of the  created .xml file in the NetAnim display. Screenshot of 5 packet captured files that your program  generates. Attach the code of your program in the submission report particularly 5 packet  captured generation code.

[Hints: You can use Lab-3 task (aodv.cc) program and modify it according to the Task2]

________________________________________________________________________

Task 3 [Marks 25]

Q3. Case Study:

Many wireless devices use wireless technology, yet they lack the necessary security protections. In  an Australian Information Security Association (AISA) members gathering in Melbourne a security  researcher, who has himself a diabetic, demonstrated a wireless attack on an insulin pump that  could change the delivery of the patient. In this gathering another AISA member who is a security  vendor found that they can scan a public space from up to 91 meters (300 feet) away, find  vulnerable pumps made by a specific medical device manufacturer, and then force these devices to  dispense fatal insulin doses.

Based on the above scenario, write a short report and answer the following questions:  a) Conduct research on the current state of the attacks on wireless medical devices and proposed  defenses to mitigate the attack.

b) Should the vendors who make this wireless medical device be forced to add security to their  devices? What should be the penalty if they do not?

c) As per Australian cyber security laws, what should be the penalty for an attacker who  manipulates a wireless device.

Source: Book: Security Awareness: Applying Practical Cybersecurity in your world, Mark Ciampa, Cengage.

————————————————-:End of Task:—————————————————

Marking Guide

Section to be included in the report

Description of the section

Marks

Task-1:

Q1. Explore and analyze NS2 and  NS3 network simulators and write a  short comparative study report. Q2. What is the latest version of  NS3 simulator? What new features are added in the latest version of the  NS3 simulator? Write a short report  on the Changes from NS-3.38 to  latest version of NS3 simulator.  Describe the new API and model  change history of NS3.

Q1. Detail Comparative study report  on NS2 and NS3 Network simulators. Each simulator description in the  study will be 5 marks each.

Q2. Correct and appropriate answers  to this question. 10 marks.

5+5+10=20

Task-2: NS3 Simulation

Correctly written the Multihop  Ad Hoc wireless networks program for  generation of 5 packets captured files and appropriately created .xml file. Provided codes.

15

Task-3: Case Study

Introduction

Introduction

2

Conduct research on the current state  of the attacks on wireless medical  devices and proposed defenses to  mitigate the attack.

Research the current state of the  attacks on wireless medical devices  and proposed defenses to mitigate  the attack.

10

Should the vendors who make this  wireless medical device be forced to  add security to their devices? What  should be the penalty if they do not?

Appropriate answers on question  part b.

4

As per Australian cyber security laws,  what should be the penalty for an  attacker who manipulates a wireless  device.

As per Australian cyber security laws,  currently explained the penalty for  an attacker who manipulates a  wireless device.

3

Conclusion

Write a summary of the report  highlighting the positive and negative  points.

2

Reference style

Follow the IEEE reference style.  Reference should be cited in the body  of the report.

2

Format of the report

Report Layout and Format. Format  must look professional.

2

Marking Rubric for Assignment #2: Total Marks 60

Grade

Mark

HD

80-100

D

70-79

CR

60-69

P

50-59

Fail

<50

Excellent

Very Good

Good

Satisfactory

Unsatisfactory

Task 1

Written

comparative

study report on  NS2 and NS3

network

simulators. /20

Explored, studied,  and compared their  features on NS2

and NS3 simulators.

Relevant and  soundly

analyzed

and wrote a comparative  study report.

Generally

relevant and

comparative

study reported.

Comparative

study reported  but not up to

the standard.

Comparative

study report is  poorly written

Task 2

NS3

Simulation/7

Correctly written  the Multihop  Ad Hoc wireless  networks program  using and  generated 5 packet  capture files.

Provided codes.

Very good.  Written the  Multihop

Ad Hoc

wireless

networks

program and  generated 5 packet

capture files. Provided

codes.

Good in writing  the Multihop  Ad Hoc wireless  networks

program.

generated 5 packet capture  files. Provided  codes.

Satisfactorily

writing the  Multihop Ad Hoc wireless

networks

program.

Generated 5  packet capture  files. Provided  codes but hard  to find the  location where  change has been  done.

Poorly or not

attempt writing  the code.

Task 2

NS3

Simulation/8

Appropriately

created .xml file.  And generated 6  packets captured files. Provided Valid  Screenshots.

Created .xml file. And  generated

packets

captured

files.

Provided

relevant

screen shots.

Properly named  the

.xml file. And

generated

packets

captured files.  Provided

relevant visible  screen shots

Satisfactorily

named the

.xml file. And

generated

packets

captured files.  Relevant screenshots are not

clearly visible

Poor

screenshots.

Hard to find the  .xml

File. No output  of the screen

shots.

Task 2

Case study

Introduction/2

All topics are

pertinent and

covered in depth.

Topics are

relevant and

Generally

relevant and

analyzed.

Some relevance  and briefly

presented.

This is not

relevant to the

 

Ability to think

critically and source  material is

demonstrated

soundly

analyzed.

assignment

topic.

Research the

current state of  the attacks on  wireless medical  devices and

proposed

defenses to

mitigate the

attack./10

Demonstrated

excellent ability to  think critically and  present an

exceptional

research report and  attack mitigation  techniques.

Demonstrate

ed good

ability to

think

critically and  present a

research

report and

attack

mitigation

techniques.

Demonstrated  good ability to  think critically  and present a  good research  report and

attack

mitigation

techniques.

Demonstrated  ability to think  critically and

present a fair

research report  and attack

mitigation

techniques.

Did not

demonstrate

ability to think

critically and

present poor

research report  and attack

mitigation

techniques.

Should the

vendors who

make this

wireless medical  device be

forced to add

security to their  devices? What  should be

penalty if they  do not? /4

Excellently

proposal for dog  vendor penalty

Very good

proposal for  dogy vendor  penalty

Good proposal  for dogy vendor  penalty

Fair proposal for  dogy vendor

penalty .

Poor proposal  for dogy vendor  penalty .

As per

Australian cyber  security laws,

what should be  the penalty for  an attacker who  manipulates a  wireless

device./3

Excellent strategy  for an attacker who  manipulates a

medical wireless

device.

Very good of  your proposed  strategy for  an attacker

who

manipulates  a medical

wireless

device.

Good strategy  for an attacker  who

manipulates a  medical

wireless device.

Fair strategy of  for an attacker  who

manipulates a

medical wireless  device.

Not relevancy of  your prosed

strategy for an  attacker who

manipulates a  medical wireless  device.

Conclusion/2

Excellent summary  of the report

highlighting all the  positive and

negative points

Very good

summary of  the report

highlighting  most of the  positive and  negative

points

Good

summary of the  report

highlighting

significant

number of the  positive and

negative points.

Fair summary  of the report

highlighting a

few numbers of  the positive and  negative points.

Poor summary  of the report.

Failed to be

highlighting

positive and

negative points.

Reference

style/2

Clear styles with

excellent source of  references. Cited  well in the body of  the report.

Clear

referencing

style and

cited in the

body of the  report.

Generally good  referencing

style

Sometimes clear  referencing style

Lacks

consistency

with many

errors

Format and the  report Layout.

/2

Exceptional report  layout, style and

language used

Very good

report

layout, style  and

Good report

layout, style

and language

used

Acceptable

report layout,

style and

language used

Poor report

layout, style and  language used

 

language

used