Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code MN603 Unit Title Wireless Networks and Security Assessment Type Individual Assignment 1 Assessment Title Analysis of routing...

1 answer below »
Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code MN603 Unit Title Wireless Networks and Security Assessment Type Individual Assignment 1 Assessment Title Analysis of routing protocols in terms of security, QoS, and energy efficiency Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to analyse the routing protocols and evaluate them in terms of security, QoS, and energy efficiency. Students will be able to complete the following ULOs: a. Compare standards-based technologies used in various networks; b. Test and evaluate various wireless networks performance; Weight 10% (Part-A 3% and Part-B 7%) Total Marks 130 (Part-A 30 and Part- B 70) Word limit 2000 – 2500 words (Part-A 600 -750 words) (Part- B 1400-1750 words) Due Date Part –A Due Week 3 (5/04/2020 11:55PM), Week 7(3/05/2020 11:55PM) Submission Guidelines  All work must be submitted on Moodle by the due date.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/Plagiarism-Academic-Misconduct-PolicyProcedure. For further information, please refer to the Academic Integrity Section in your Unit Description. MN603 Wireless Networks and Security Page#2 of 4 Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha March, 2020 Part A Assignment Description Routing can optimize network performance such as delivery ratio, delivery delay, and overhead. In other words, routing determines the sequence of transmitting nodes and the number of packets transmitted by each node. Transmitting nodes and the number of their transmissions influence the generated interference. Routing in wireless sensor networks (WSN) is very challenging due to the inherent characteristics that distinguish these networks from other wireless networks like mobile ad hoc networks or cellular networks. Routing protocols in WSN might differ depending on the application and network architecture. In this assignment, students will investigate on two clustering based protocols, LowEnergy Adaptive Clustering Hierarchy (LEACH) and Power-Efficient GAthering in Sensor Information System (PEGASIS) in Wirelessnetworks. LEACH and PEGASIS are clustering based protocol to collected data from wireless network. The students are required to submit a report including technical details on  Routing mechanism  How these protocols can be used to reduce energy consumption  Advantages and limitations of using these protocols in WSNs Part B In part B Students are required to continue their investigation on both routing protocol and submit a report covering following aspects of these routing protocols: 1) Highlight Security issues of the routing protocols 2) Discuss the attacks that may happen while operating on these routing protocols 3) How to countermeasure the attacks discussed in 2? 4) Comparative analysis on performance of the routing protocols. Note: minimum 3 journal papers and 3 conference papers (in IEEE format) must be use in analysis and justifications Marking criteria: Section to be included in the report Description of the section Marks Part A 30 Introduction Define the topic and outline of the report ( in 5-6 sentences) 5 Motivation You need to motivate the reader about the topic 5 Routing protocols analysis Technical discussion on routing mechanism 1. LEACH 2. PEGSIS 10+10=20 MN603 Wireless Networks and Security Page#3 of 4 Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha March, 2020 Part B 70 Feedback incorporation from Part A 30 Security issues and attacks against the routing protocols Discuss the security issues and attacks that may happen under the routing protocols 20 Attacks’ countermeasure How to countermeasure the attacks discussed 20 Comparative analysis Conduct comparative analysis on performance of the selected routing protocols 10 Conclusion Write summary of the report 10 Reference style Follow IEEE reference style 10 Total 130 Marking Rubric for Assignment #1: Total Marks 100 Grade Mark HD (80-100)% DI (70-79)% CR (60-69)% P (50-59)% Fail <50% excellent very good good satisfactory unsatisfactory introduction /5 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. motivation /5 exceptional motivation very good motivation good motivation acceptable motivation poor motivation routing protocols analysis /20 finding is well explained with clear justification finding is well explained with moderate justification finding is explained with convincing justification finding is not clear and unjustified finding is not available incorporation of feedback from part a /30 all feedbacks are addressed with proper justification most of the feedbacks are addressed with justification feedbacks are addressed with convincing justification justifications are not clear feedback not addressed attacks against the routing protocols /20 excellent understanding of security issues and attacks very good understandi ng of security issues and attacks good understanding of security issues and attacks demonstrated adequate understanding security issues and attacks poor understanding of security issues and attacks attacks’ countermeasu re /20 exceptional countermeasure very good countermea sure good countermeasur e fair countermeasur e unable to discuss any countermeasur e mn603 wireless networks and security page#4 of 4 prepared by: dr nazmus shaker nafi moderated by: dr sanjeeb shrestha march, 2020 comparative analysis /10 exceptional analysis very good analysis good analysis fair analysis unable to conduct comparative excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 5="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" topics="" are="" relevant="" and="" soundly="" analysed.="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" assignment="" topic.="" motivation="" 5="" exceptional="" motivation="" very="" good="" motivation="" good="" motivation="" acceptable="" motivation="" poor="" motivation="" routing="" protocols="" analysis="" 20="" finding="" is="" well="" explained="" with="" clear="" justification="" finding="" is="" well="" explained="" with="" moderate="" justification="" finding="" is="" explained="" with="" convincing="" justification="" finding="" is="" not="" clear="" and="" unjustified="" finding="" is="" not="" available="" incorporation="" of="" feedback="" from="" part="" a="" 30="" all="" feedbacks="" are="" addressed="" with="" proper="" justification="" most="" of="" the="" feedbacks="" are="" addressed="" with="" justification="" feedbacks="" are="" addressed="" with="" convincing="" justification="" justifications="" are="" not="" clear="" feedback="" not="" addressed="" attacks="" against="" the="" routing="" protocols="" 20="" excellent="" understanding="" of="" security="" issues="" and="" attacks="" very="" good="" understandi="" ng="" of="" security="" issues="" and="" attacks="" good="" understanding="" of="" security="" issues="" and="" attacks="" demonstrated="" adequate="" understanding="" security="" issues="" and="" attacks="" poor="" understanding="" of="" security="" issues="" and="" attacks="" attacks’="" countermeasu="" re="" 20="" exceptional="" countermeasure="" very="" good="" countermea="" sure="" good="" countermeasur="" e="" fair="" countermeasur="" e="" unable="" to="" discuss="" any="" countermeasur="" e="" mn603="" wireless="" networks="" and="" security="" page#4="" of="" 4="" prepared="" by:="" dr="" nazmus="" shaker="" nafi="" moderated="" by:="" dr="" sanjeeb="" shrestha="" march,="" 2020="" comparative="" analysis="" 10="" exceptional="" analysis="" very="" good="" analysis="" good="" analysis="" fair="" analysis="" unable="" to="" conduct="">
Answered Same DayMar 29, 2021MN603

Answer To: Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code MN603 Unit Title Wireless...

Ritu answered on Apr 02 2021
126 Votes
MN603: Wireless Networks and Security
        7
MN603: Wireless Networks and Security
Analysis of routing protocols in terms of security, QoS, and energy efficiency
[Type the author name]
[Pick the date]
Contents
Introduction    3
Motivation    3
Routing Protocols Analysis    3
LEACH Protocol    3
PEGASIS Protocol    4
Security issues and attacks against the routing protocols    5
Low Energy Adaptive Clustering Hierarchy (LEACH)    5
Power Efficient Gathering in
Sensor Information System (PEGASIS)    6
Attacks and Countermeasure    6
Comparative analysis    8
Conclusion    8
References    9
Introduction
The effectiveness of the remote sensor arranges is generally reliant on the steering convention utilized. Directing is a major test for sensor systems since it presents an exchange off between responsiveness just as productivity. The directing class' chain of command class brings structure into the system for soundness, vitality proficiency, just as adaptability. There are different conventions right now. This white paper breaks down low vitality versatile bunching chain of command (REACH) just as Power-proficient social occasion with the Sensor Information System (PEGASIS) layered convention. This undertaking examines these conventions dependent on complete vitality utilization, overhead, just as sensor life, just as contrasts LEACH just as PEGASIS and the recreation results.
Motivation
Advances in correspondence innovation just as electronic parts make it simple to get a little, economical chip associated through a remote system. The Wireless Sensor Network (WSN) comprises of the source hub of the low-power sensor, a lot of assets for computation at the inside for handling information collection, just as a sink hub where all data is inevitably amassed. The remote sensor arranges is utilized in an assortment of utilizations for checking. The applications are: Environmental, wellbeing, military, and home, just as modern mechanization. Directing is an approach to discover the way between the sources just as goal hubs. WSN utilizes the system layer to apply steering. Directing conventions are a significant part of the structure for setting up correspondence joins. For sensor systems, directing conventions require high dependability [1]. The system must be strong, as there are various ways accessible to send information from the source hub to the goal hub. Notwithstanding restricting the vitality of the sensor hub, reviving the sensor hub is normally ridiculous for its versatility. In this manner, vitality constraints are a significant structure issue in remote sensor systems. For sensor organizes, the system convention is centered on low force utilization to expand the life of the system [5].
Routing Protocols Analysis
LEACH Protocol
Routing is a function of a wireless network as well as is a security used to consume sufficient energy. Low energy adaptive clustering hierarchy (REACH) is a TDMA-based MAC protocol that combines clustering between wireless networks as well as simple transmission procedures. The main goal is to minimize the energy consumption required to create as well as maintain clusters to extend the life of the wireless sensor network. The primary purpose of LEACH is to create a cluster of sensor nodes based on received signal strength as well as use the local cluster head as a router to the sink. Since the transmission is done only by the cluster head, not all sensor nodes, it essentially saves energy.
Use single-hop routing, where each node can transfer directly to the cluster head as well as to the sink. Therefore, it cannot be applied to large area networks. To reduce energy consumption in wireless networks, the LEACH protocol is integrated with the SPIN protocol. Integration is used to reduce the limitations of the original LEACH protocol. For example, a node adjacent to the LEACH protocol sends the same information to the cluster head, which increases energy consumption as well as reduces network life. After the S-LEACH protocol are applied, nodes less than a few meters from the node's location send the same data, reducing the need for multiple nodes to send the same data? Adjacent nodes are forced to hibernate until the first node stops. The results of the S-LEACH protocol are more efficient as well as reduce the energy consumption of wireless networks [3].
Advantages
· Extend the life of your wireless network by consuming only a fraction of the total system energy.
Disadvantages
· The same information is sent from multiple nodes to the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here