Wireless Networks and Security (MN603 Assessment-2) Assignment Help
Assessment Details and Submission Guidelines |
|
Trimester |
T2 2024 |
Unit Code |
MN603 |
Unit Title |
Wireless Networks and Security |
Assessment Type |
Assignment 2 (Group assignment, 3-4 members per group) |
Assessment Title |
Implementation of Wireless networks and performance evaluation |
Purpose of the assessment (with ULO Mapping) |
The purpose of the assignment is to compare NS3 simulators with other current network simulators. Developed, modified and studied wireless routing protocols performance with NS3 simulator. Design and implement Wireless Local Area Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient and secure data transmission. Students will be able to complete the following ULOs: • Analyze and compare wireless communication protocols. • Compare standard-based technologies used in various networks. • Test and evaluate various wireless networks performance. |
Weight |
20% |
Total Marks |
60 |
Word limit |
2500-3500 |
Due Date |
Week 11; 27/09/2024 |
Submission Guidelines |
• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style. |
Extension |
• If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy |
Academic Misconduct |
• Academic Misconduct is a serious offense. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at For further information, please refer to the Academic Integrity Section in your Unit Description. |
Use of Generative Artificial Intelligence (GenAI) in Assessments |
• More information about the use of Gen AI in student assessment can be found in the full policy and procedure available at: Further support can be found in the • Further details on the type of assessment tasks, and whether Gen AI is permitted to be used or not are provided in the assessment brief. |
Artificial Intelligence (AI) Score Limit. |
• Not acceptable AI score more than 30%. Please check your assignment AI score before submission. |
Assignment Description
This assignment consists of three tasks.
Task 1 Study and analysis two network simulation software tools. Study the latest version of the NS3 simulator tool. Describe the new API and model change history of NS3.
Task 2. Involving analysis and modification of the NS3 lab exercises code. Task 3 It is a case study task. You need to analyze and answer three specific questions.
[Total Marks 55]
________________________________________________________________________________
Task1 [Marks 10+10=20]
Q1. Explore and analyze the following network simulator and write a short comparative study report.
• NS3
• NS2
Q2. What is the latest version of NS3 simulator? What new features are added in the latest version of the NS3 simulator? Write a short report on the Changes from NS-3.38 to the latest version of NS3 simulator. Describe the new API and model change history of NS3.
______________________________________________________________________________
Task 2 [Marks 15]
Q2. Write a Multihop Ad Hoc wireless networks program for simulating in the NS3 simulator. Name the program as your group number. Your program should generate 5 packet captured files. Also give the name of the xml file as “Your Group name.xml.” Execute the program and execute NetAnim for visualization of the performance of your Multihop Ad Hoc program. Take a screenshot of the created .xml file in the NetAnim display. Screenshot of 5 packet captured files that your program generates. Attach the code of your program in the submission report particularly 5 packet captured generation code.
[Hints: You can use Lab-3 task (aodv.cc) program and modify it according to the Task2]
________________________________________________________________________
Task 3 [Marks 25]
Q3. Case Study:
Many wireless devices use wireless technology, yet they lack the necessary security protections. In an Australian Information Security Association (AISA) members gathering in Melbourne a security researcher, who has himself a diabetic, demonstrated a wireless attack on an insulin pump that could change the delivery of the patient. In this gathering another AISA member who is a security vendor found that they can scan a public space from up to 91 meters (300 feet) away, find vulnerable pumps made by a specific medical device manufacturer, and then force these devices to dispense fatal insulin doses.
Based on the above scenario, write a short report and answer the following questions: a) Conduct research on the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack.
b) Should the vendors who make this wireless medical device be forced to add security to their devices? What should be the penalty if they do not?
c) As per Australian cyber security laws, what should be the penalty for an attacker who manipulates a wireless device.
Source: Book: Security Awareness: Applying Practical Cybersecurity in your world, Mark Ciampa, Cengage.
————————————————-:End of Task:—————————————————
Marking Guide
Section to be included in the report |
Description of the section |
Marks |
Task-1: Q1. Explore and analyze NS2 and NS3 network simulators and write a short comparative study report. Q2. What is the latest version of NS3 simulator? What new features are added in the latest version of the NS3 simulator? Write a short report on the Changes from NS-3.38 to latest version of NS3 simulator. Describe the new API and model change history of NS3. |
Q1. Detail Comparative study report on NS2 and NS3 Network simulators. Each simulator description in the study will be 5 marks each. Q2. Correct and appropriate answers to this question. 10 marks. |
5+5+10=20 |
Task-2: NS3 Simulation |
Correctly written the Multihop Ad Hoc wireless networks program for generation of 5 packets captured files and appropriately created .xml file. Provided codes. |
15 |
Task-3: Case Study |
||
Introduction |
Introduction |
2 |
Conduct research on the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack. |
Research the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack. |
10 |
Should the vendors who make this wireless medical device be forced to add security to their devices? What should be the penalty if they do not? |
Appropriate answers on question part b. |
4 |
As per Australian cyber security laws, what should be the penalty for an attacker who manipulates a wireless device. |
As per Australian cyber security laws, currently explained the penalty for an attacker who manipulates a wireless device. |
3 |
Conclusion |
Write a summary of the report highlighting the positive and negative points. |
2 |
Reference style |
Follow the IEEE reference style. Reference should be cited in the body of the report. |
2 |
Format of the report |
Report Layout and Format. Format must look professional. |
2 |
Marking Rubric for Assignment #2: Total Marks 60
Grade Mark |
HD 80-100 |
D 70-79 |
CR 60-69 |
P 50-59 |
Fail <50 |
Excellent |
Very Good |
Good |
Satisfactory |
Unsatisfactory |
|
Task 1 |
|||||
Written comparative study report on NS2 and NS3 network simulators. /20 |
Explored, studied, and compared their features on NS2 and NS3 simulators. |
Relevant and soundly analyzed and wrote a comparative study report. |
Generally relevant and comparative study reported. |
Comparative study reported but not up to the standard. |
Comparative study report is poorly written |
Task 2 NS3 Simulation/7 |
Correctly written the Multihop Ad Hoc wireless networks program using and generated 5 packet capture files. Provided codes. |
Very good. Written the Multihop Ad Hoc wireless networks program and generated 5 packet capture files. Provided codes. |
Good in writing the Multihop Ad Hoc wireless networks program. generated 5 packet capture files. Provided codes. |
Satisfactorily writing the Multihop Ad Hoc wireless networks program. Generated 5 packet capture files. Provided codes but hard to find the location where change has been done. |
Poorly or not attempt writing the code. |
Task 2 NS3 Simulation/8 |
Appropriately created .xml file. And generated 6 packets captured files. Provided Valid Screenshots. |
Created .xml file. And generated packets captured files. Provided relevant screen shots. |
Properly named the .xml file. And generated packets captured files. Provided relevant visible screen shots |
Satisfactorily named the .xml file. And generated packets captured files. Relevant screenshots are not clearly visible |
Poor screenshots. Hard to find the .xml File. No output of the screen shots. |
Task 2 Case study |
|||||
Introduction/2 |
All topics are pertinent and covered in depth. |
Topics are relevant and |
Generally relevant and analyzed. |
Some relevance and briefly presented. |
This is not relevant to the |
Ability to think critically and source material is demonstrated |
soundly analyzed. |
assignment topic. |
|||
Research the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack./10 |
Demonstrated excellent ability to think critically and present an exceptional research report and attack mitigation techniques. |
Demonstrate ed good ability to think critically and present a research report and attack mitigation techniques. |
Demonstrated good ability to think critically and present a good research report and attack mitigation techniques. |
Demonstrated ability to think critically and present a fair research report and attack mitigation techniques. |
Did not demonstrate ability to think critically and present poor research report and attack mitigation techniques. |
Should the vendors who make this wireless medical device be forced to add security to their devices? What should be penalty if they do not? /4 |
Excellently proposal for dog vendor penalty |
Very good proposal for dogy vendor penalty |
Good proposal for dogy vendor penalty |
Fair proposal for dogy vendor penalty . |
Poor proposal for dogy vendor penalty . |
As per Australian cyber security laws, what should be the penalty for an attacker who manipulates a wireless device./3 |
Excellent strategy for an attacker who manipulates a medical wireless device. |
Very good of your proposed strategy for an attacker who manipulates a medical wireless device. |
Good strategy for an attacker who manipulates a medical wireless device. |
Fair strategy of for an attacker who manipulates a medical wireless device. |
Not relevancy of your prosed strategy for an attacker who manipulates a medical wireless device. |
Conclusion/2 |
Excellent summary of the report highlighting all the positive and negative points |
Very good summary of the report highlighting most of the positive and negative points |
Good summary of the report highlighting significant number of the positive and negative points. |
Fair summary of the report highlighting a few numbers of the positive and negative points. |
Poor summary of the report. Failed to be highlighting positive and negative points. |
Reference style/2 |
Clear styles with excellent source of references. Cited well in the body of the report. |
Clear referencing style and cited in the body of the report. |
Generally good referencing style |
Sometimes clear referencing style |
Lacks consistency with many errors |
Format and the report Layout. /2 |
Exceptional report layout, style and language used |
Very good report layout, style and |
Good report layout, style and language used |
Acceptable report layout, style and language used |
Poor report layout, style and language used |
language used |
Leave A Comment