Wireless Networks and Security (MN603 Assessment-2) Assignment Help
Assessment Details and Submission Guidelines
Trimester
T2 2024
Unit Code
MN603
Unit Title
Wireless Networks and Security
Assessment
Type
Assignment 2 (Group assignment, 3-4 members per group)
Assessment
Title
Implementation of Wireless networks and performance evaluation
Purpose of the assessment
(with ULO Mapping)
The purpose of the assignment is to compare NS3 simulators with other current network simulators. Developed, modified and studied wireless routing protocols performance with NS3 simulator. Design and implement Wireless Local Area Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient and secure data transmission.
Students will be able to complete the following ULOs:
• Analyze and compare wireless communication protocols. • Compare standard-based technologies used in various networks. • Test and evaluate various wireless networks performance.
Weight
20%
Total Marks
60
Word limit
2500-3500
Due Date
Week 11; 27/09/2024
Submission
Guidelines
• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
• Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.
Extension
• If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy
Academic
Misconduct
• Academic Misconduct is a serious offense. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at
For further information, please refer to the Academic Integrity Section in your Unit Description.
Use of
Generative
Artificial
Intelligence
(GenAI) in
Assessments
• More information about the use of Gen AI in student assessment can be found in the full policy and procedure available at: Further support can be found in the
• Further details on the type of assessment tasks, and whether Gen AI is permitted to be used or not are provided in the assessment brief.
Artificial
Intelligence
(AI) Score
Limit.
• Not acceptable AI score more than 30%. Please check your assignment AI score before submission.
Assignment Description
This assignment consists of three tasks.
Task 1 Study and analysis two network simulation software tools. Study the latest version of the NS3 simulator tool. Describe the new API and model change history of NS3.
Task 2. Involving analysis and modification of the NS3 lab exercises code. Task 3 It is a case study task. You need to analyze and answer three specific questions.
[Total Marks 55]
________________________________________________________________________________
Task1 [Marks 10+10=20]
Q1. Explore and analyze the following network simulator and write a short comparative study report.
• NS3
• NS2
Q2. What is the latest version of NS3 simulator? What new features are added in the latest version of the NS3 simulator? Write a short report on the Changes from NS-3.38 to the latest version of NS3 simulator. Describe the new API and model change history of NS3.
______________________________________________________________________________
Task 2 [Marks 15]
Q2. Write a Multihop Ad Hoc wireless networks program for simulating in the NS3 simulator. Name the program as your group number. Your program should generate 5 packet captured files. Also give the name of the xml file as “Your Group name.xml.” Execute the program and execute NetAnim for visualization of the performance of your Multihop Ad Hoc program. Take a screenshot of the created .xml file in the NetAnim display. Screenshot of 5 packet captured files that your program generates. Attach the code of your program in the submission report particularly 5 packet captured generation code.
[Hints: You can use Lab-3 task (aodv.cc) program and modify it according to the Task2]
________________________________________________________________________
Task 3 [Marks 25]
Q3. Case Study:
Many wireless devices use wireless technology, yet they lack the necessary security protections. In an Australian Information Security Association (AISA) members gathering in Melbourne a security researcher, who has himself a diabetic, demonstrated a wireless attack on an insulin pump that could change the delivery of the patient. In this gathering another AISA member who is a security vendor found that they can scan a public space from up to 91 meters (300 feet) away, find vulnerable pumps made by a specific medical device manufacturer, and then force these devices to dispense fatal insulin doses.
Based on the above scenario, write a short report and answer the following questions: a) Conduct research on the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack.
b) Should the vendors who make this wireless medical device be forced to add security to their devices? What should be the penalty if they do not?
c) As per Australian cyber security laws, what should be the penalty for an attacker who manipulates a wireless device.
Source: Book: Security Awareness: Applying Practical Cybersecurity in your world, Mark Ciampa, Cengage.
————————————————-:End of Task:—————————————————
Marking Guide
Section to be included in the report
Description of the section
Marks
Task-1:
Q1. Explore and analyze NS2 and NS3 network simulators and write a short comparative study report. Q2. What is the latest version of NS3 simulator? What new features are added in the latest version of the NS3 simulator? Write a short report on the Changes from NS-3.38 to latest version of NS3 simulator. Describe the new API and model change history of NS3.
Q1. Detail Comparative study report on NS2 and NS3 Network simulators. Each simulator description in the study will be 5 marks each.
Q2. Correct and appropriate answers to this question. 10 marks.
5+5+10=20
Task-2: NS3 Simulation
Correctly written the Multihop Ad Hoc wireless networks program for generation of 5 packets captured files and appropriately created .xml file. Provided codes.
15
Task-3: Case Study
Introduction
Introduction
2
Conduct research on the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack.
Research the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack.
10
Should the vendors who make this wireless medical device be forced to add security to their devices? What should be the penalty if they do not?
Appropriate answers on question part b.
4
As per Australian cyber security laws, what should be the penalty for an attacker who manipulates a wireless device.
As per Australian cyber security laws, currently explained the penalty for an attacker who manipulates a wireless device.
3
Conclusion
Write a summary of the report highlighting the positive and negative points.
2
Reference style
Follow the IEEE reference style. Reference should be cited in the body of the report.
2
Format of the report
Report Layout and Format. Format must look professional.
2
Marking Rubric for Assignment #2: Total Marks 60
Grade
Mark
HD
80-100
D
70-79
CR
60-69
P
50-59
Fail
<50
Excellent
Very Good
Good
Satisfactory
Unsatisfactory
Task 1
Written
comparative
study report on NS2 and NS3
network
simulators. /20
Explored, studied, and compared their features on NS2
and NS3 simulators.
Relevant and soundly
analyzed
and wrote a comparative study report.
Generally
relevant and
comparative
study reported.
Comparative
study reported but not up to
the standard.
Comparative
study report is poorly written
Task 2
NS3
Simulation/7
Correctly written the Multihop Ad Hoc wireless networks program using and generated 5 packet capture files.
Provided codes.
Very good. Written the Multihop
Ad Hoc
wireless
networks
program and generated 5 packet
capture files. Provided
codes.
Good in writing the Multihop Ad Hoc wireless networks
program.
generated 5 packet capture files. Provided codes.
Satisfactorily
writing the Multihop Ad Hoc wireless
networks
program.
Generated 5 packet capture files. Provided codes but hard to find the location where change has been done.
Poorly or not
attempt writing the code.
Task 2
NS3
Simulation/8
Appropriately
created .xml file. And generated 6 packets captured files. Provided Valid Screenshots.
Created .xml file. And generated
packets
captured
files.
Provided
relevant
screen shots.
Properly named the
.xml file. And
generated
packets
captured files. Provided
relevant visible screen shots
Satisfactorily
named the
.xml file. And
generated
packets
captured files. Relevant screenshots are not
clearly visible
Poor
screenshots.
Hard to find the .xml
File. No output of the screen
shots.
Task 2
Case study
Introduction/2
All topics are
pertinent and
covered in depth.
Topics are
relevant and
Generally
relevant and
analyzed.
Some relevance and briefly
presented.
This is not
relevant to the
Ability to think
critically and source material is
demonstrated
soundly
analyzed.
assignment
topic.
Research the
current state of the attacks on wireless medical devices and
proposed
defenses to
mitigate the
attack./10
Demonstrated
excellent ability to think critically and present an
exceptional
research report and attack mitigation techniques.
Demonstrate
ed good
ability to
think
critically and present a
research
report and
attack
mitigation
techniques.
Demonstrated good ability to think critically and present a good research report and
attack
mitigation
techniques.
Demonstrated ability to think critically and
present a fair
research report and attack
mitigation
techniques.
Did not
demonstrate
ability to think
critically and
present poor
research report and attack
mitigation
techniques.
Should the
vendors who
make this
wireless medical device be
forced to add
security to their devices? What should be
penalty if they do not? /4
Excellently
proposal for dog vendor penalty
Very good
proposal for dogy vendor penalty
Good proposal for dogy vendor penalty
Fair proposal for dogy vendor
penalty .
Poor proposal for dogy vendor penalty .
As per
Australian cyber security laws,
what should be the penalty for an attacker who manipulates a wireless
device./3
Excellent strategy for an attacker who manipulates a
medical wireless
device.
Very good of your proposed strategy for an attacker
who
manipulates a medical
wireless
device.
Good strategy for an attacker who
manipulates a medical
wireless device.
Fair strategy of for an attacker who
manipulates a
medical wireless device.
Not relevancy of your prosed
strategy for an attacker who
manipulates a medical wireless device.
Conclusion/2
Excellent summary of the report
highlighting all the positive and
negative points
Very good
summary of the report
highlighting most of the positive and negative
points
Good
summary of the report
highlighting
significant
number of the positive and
negative points.
Fair summary of the report
highlighting a
few numbers of the positive and negative points.
Poor summary of the report.
Failed to be
highlighting
positive and
negative points.
Reference
style/2
Clear styles with
excellent source of references. Cited well in the body of the report.
Clear
referencing
style and
cited in the
body of the report.
Generally good referencing
style
Sometimes clear referencing style
Lacks
consistency
with many
errors
Format and the report Layout.
/2
Exceptional report layout, style and
language used
Very good
report
layout, style and
Good report
layout, style
and language
used
Acceptable
report layout,
style and
language used
Poor report
layout, style and language used