Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code MN603 Unit Title Wireless Networks and Security Assessment Type Individual Assignment 1 Assessment Title Analysis of routing...

1 answer below »
Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code MN603 Unit Title Wireless Networks and Security Assessment Type Individual Assignment 1 Assessment Title Analysis of routing protocols in terms of security, QoS, and energy efficiency Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to analyse the routing protocols and evaluate them in terms of security, QoS, and energy efficiency. Students will be able to complete the following ULOs: a. Compare standards-based technologies used in various networks; b. Test and evaluate various wireless networks performance; Weight 10% (Part-A 3% and Part-B 7%) Total Marks 130 (Part-A 30 and Part- B 70) Word limit 2000 – 2500 words (Part-A 600 -750 words) (Part- B 1400-1750 words) Due Date Part –A Due Week 3 (5/04/2020 11:55PM), Week 7(3/05/2020 11:55PM) Submission Guidelines  All work must be submitted on Moodle by the due date.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/Plagiarism-Academic-Misconduct-PolicyProcedure. For further information, please refer to the Academic Integrity Section in your Unit Description. MN603 Wireless Networks and Security Page#2 of 4 Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha March, 2020 Part A Assignment Description Routing can optimize network performance such as delivery ratio, delivery delay, and overhead. In other words, routing determines the sequence of transmitting nodes and the number of packets transmitted by each node. Transmitting nodes and the number of their transmissions influence the generated interference. Routing in wireless sensor networks (WSN) is very challenging due to the inherent characteristics that distinguish these networks from other wireless networks like mobile ad hoc networks or cellular networks. Routing protocols in WSN might differ depending on the application and network architecture. In this assignment, students will investigate on two clustering based protocols, LowEnergy Adaptive Clustering Hierarchy (LEACH) and Power-Efficient GAthering in Sensor Information System (PEGASIS) in Wirelessnetworks. LEACH and PEGASIS are clustering based protocol to collected data from wireless network. The students are required to submit a report including technical details on  Routing mechanism  How these protocols can be used to reduce energy consumption  Advantages and limitations of using these protocols in WSNs Part B In part B Students are required to continue their investigation on both routing protocol and submit a report covering following aspects of these routing protocols: 1) Highlight Security issues of the routing protocols 2) Discuss the attacks that may happen while operating on these routing protocols 3) How to countermeasure the attacks discussed in 2? 4) Comparative analysis on performance of the routing protocols. Note: minimum 3 journal papers and 3 conference papers (in IEEE format) must be use in analysis and justifications Marking criteria: Section to be included in the report Description of the section Marks Part A 30 Introduction Define the topic and outline of the report ( in 5-6 sentences) 5 Motivation You need to motivate the reader about the topic 5 Routing protocols analysis Technical discussion on routing mechanism 1. LEACH 2. PEGSIS 10+10=20 MN603 Wireless Networks and Security Page#3 of 4 Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha March, 2020 Part B 70 Feedback incorporation from Part A 30 Security issues and attacks against the routing protocols Discuss the security issues and attacks that may happen under the routing protocols 20 Attacks’ countermeasure How to countermeasure the attacks discussed 20 Comparative analysis Conduct comparative analysis on performance of the selected routing protocols 10 Conclusion Write summary of the report 10 Reference style Follow IEEE reference style 10 Total 130 Marking Rubric for Assignment #1: Total Marks 100 Grade Mark HD (80-100)% DI (70-79)% CR (60-69)% P (50-59)% Fail <50% excellent very good good satisfactory unsatisfactory introduction /5 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. motivation /5 exceptional motivation very good motivation good motivation acceptable motivation poor motivation routing protocols analysis /20 finding is well explained with clear justification finding is well explained with moderate justification finding is explained with convincing justification finding is not clear and unjustified finding is not available incorporation of feedback from part a /30 all feedbacks are addressed with proper justification most of the feedbacks are addressed with justification feedbacks are addressed with convincing justification justifications are not clear feedback not addressed attacks against the routing protocols /20 excellent understanding of security issues and attacks very good understandi ng of security issues and attacks good understanding of security issues and attacks demonstrated adequate understanding security issues and attacks poor understanding of security issues and attacks attacks’ countermeasu re /20 exceptional countermeasure very good countermea sure good countermeasur e fair countermeasur e unable to discuss any countermeasur e mn603 wireless networks and security page#4 of 4 prepared by: dr nazmus shaker nafi moderated by: dr sanjeeb shrestha march, 2020 excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 5="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" topics="" are="" relevant="" and="" soundly="" analysed.="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" assignment="" topic.="" motivation="" 5="" exceptional="" motivation="" very="" good="" motivation="" good="" motivation="" acceptable="" motivation="" poor="" motivation="" routing="" protocols="" analysis="" 20="" finding="" is="" well="" explained="" with="" clear="" justification="" finding="" is="" well="" explained="" with="" moderate="" justification="" finding="" is="" explained="" with="" convincing="" justification="" finding="" is="" not="" clear="" and="" unjustified="" finding="" is="" not="" available="" incorporation="" of="" feedback="" from="" part="" a="" 30="" all="" feedbacks="" are="" addressed="" with="" proper="" justification="" most="" of="" the="" feedbacks="" are="" addressed="" with="" justification="" feedbacks="" are="" addressed="" with="" convincing="" justification="" justifications="" are="" not="" clear="" feedback="" not="" addressed="" attacks="" against="" the="" routing="" protocols="" 20="" excellent="" understanding="" of="" security="" issues="" and="" attacks="" very="" good="" understandi="" ng="" of="" security="" issues="" and="" attacks="" good="" understanding="" of="" security="" issues="" and="" attacks="" demonstrated="" adequate="" understanding="" security="" issues="" and="" attacks="" poor="" understanding="" of="" security="" issues="" and="" attacks="" attacks’="" countermeasu="" re="" 20="" exceptional="" countermeasure="" very="" good="" countermea="" sure="" good="" countermeasur="" e="" fair="" countermeasur="" e="" unable="" to="" discuss="" any="" countermeasur="" e="" mn603="" wireless="" networks="" and="" security="" page#4="" of="" 4="" prepared="" by:="" dr="" nazmus="" shaker="" nafi="" moderated="" by:="" dr="" sanjeeb="" shrestha="" march,="">
Answered Same DayApr 01, 2021MN603

Answer To: Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code MN603 Unit Title Wireless...

Neha answered on Apr 03 2021
140 Votes
Student Name:
Student Roll No:
Unit Title:
Contents
Part A
Introduction                          3            
Motivation                              3
Technical Discussion                     3
LEACH                         4
PEGSIS                         5
Part B
Feedback                             6
Security issues                         6
Countermeasure                      8
Comparative analysis                 9    
Conclusion                          10
References                          11
Introduction
As the time is crossing, wireless sensor networks are becoming
more important for us. There are few applications which ask for quick data transfer that too with minimum possible interruption. This report is to understand the protocols used for wireless sensor networks. There are many different types of protocols which can be used for WSN, but in this report I have covered LEACH and PEGSIS protocols. These protocols have their own advantages and disadvantages also. There are several types of attacks which occurs on WSN. I have also covered few of them and their counterattacks. Lastly, I have concluded about the protocols and their features.
Motivation
Wireless sensor networks have become that part of our working models which can’t be replaced. All of us want a network which is most secured and have maximum speed. Rest is dependent on the application desires that which features are more important. To establish a network, it is very important to have complete information about the routing protocols and they should be appropriate for the requirement of the usages. This report will help the reader to understand the features and usages of the protocols and how the attacks on them can be controlled.
Routing Protocols
A routing protocol can be defined as a process which helps to select a better path for the data or information to be transferred from the source system to destination. The process finds multiple hurdles while selecting the route. The selection of route depends on the type of network, channel characteristics and the performance metrics.
LEACH
This is one of the routing protocols for WSN. It stands for Low Energy Adaptive Clustering Hierarchy. It is considered as a hierarchal protocol which provides high network lifetime and more power consumption (Gill, R. K., Chawla, P., & Sachdeva, M.). It works on the data aggregation. It is based on the cluster approach in which we send the data to the base station. In this protocol, we divide the whole network into clusters and out of them one cluster is chosen as the head. The job of the head cluster is to collect all the information and forward it to the base station. The selection of the cluster head depends on the threshold value. The cluster chooses their number as 0 or 1. This number is then compared with the threshold value and the head must have value less than threshold value. The cluster which satisfies this condition becomes the cluster head else treated as ordinary node.
The following are the advantages of LEACH routing protocol.
1. The chosen cluster head helps in aggregating the whole data. This results in the reduction of traffic in the whole network.
2. It also saves the energy because of the single hop routing from nodes to the cluster head.
3. The lifetime of the WSN is increased.
4. We do not need any location information about the nodes to create the cluster.
But as we all know all technologies which gives a long list of advantages comes with disadvantages also. Here are the disadvantages of LEACH.
1) It does not provide the number of cluster heads present in the network.
2) If the cluster dies, then the cluster becomes useless and the data which was gathered by the nodes would never reach its destination.
3) Uneven distribution of the clusters. This results in more energy consumption and huge impact on the performance of the entire network.
PEGSIS
It stands for power efficient gathering information system. It is based on the chain approach and greedy algorithm. The nodes present in the network organize themselves in the form of chain or implements the greedy algorithm (Kulkarni, A. N., & Tavildar, A. S). If any node dies between the process then the chain rebuilds itself to bypass the dead node. One node is assigned as the leader and it will transfer the data to the base station. The aim of this protocol is the receive and transfer the data to and from the nearest neighbour and returns back to the base station as the leader.
Features of PEGSIS:
    Scalability
    Very Low
    Transmission Delays
    Very...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here