please use the ieee template for assessment 2 In this assessment students are required to research on an article in the area of wireless communication. The research needs to be geared towards the...

1 answer below »
please use the ieee template for assessment 2
In this assessment students are required to research on an article in the area of wireless communication. The research needs to be geared towards the transmission fundamentals with focus on the wireless channels, analysing the performance of wireless networks. The assessment is aimed to improve the student’s investigation and analysis skills.


In this assessment you are required to prepare a 2-page abstract in IEEE Style, use the template provided on the LMS. To prepare the abstract you need to select an article published in 2015 and later. The selected article needs to include wireless transmission fundamentals. The article needs to be on one of the areas given below.


In this assessment you are required to prepare a 2-page abstract in IEEE Style, use the template provided on the LMS. To prepare the abstract you need to select an article published in 2015 and later. The selected article needs to include wireless transmission fundamentals. The article needs to be on one of the areas given below.• 4G and 5G cellular systems• Ad hoc wireless networks• Adaptive antennas for wireless systems• AI Powered Wireless Communications• Channel estimation• Computation and Data Driven Wireless Communications• Heterogeneous cellular networks• Next generation WiFi• Massive MIMO• Propagation and channel characterization
note that citation of sources is mandatory and must be in the IEEE style.
these are must
Report Layout:The report layout, language and structure should be appropriate. The report should follow the template provided on the LMS and should be 2 pages. (Extremely well structure, and organize report; use of professional language; report template has been follow)


Abstract:Include the step-by-step explanation of configuration and the related protocols and technologies(The abstract provides an insight of the article; the abstract is crisp; written extremely need to be well)


Introduction:This section should provide an outline of the assessment and the following sections. (The introduction is well rounded and provides a brief description of the assessment; the introduction sets an excellent flow for the report )


Literature Review:You should perform a literature survey on the selected article. The literature survey should include at least 5 research papers, published no later than 2015.(The literature review provides an in depth analysis of 5 published articles/conference papers in the area; the literature review is extremely well written and provides a clear insight of the area)


Evaluate:Based on the available literature, identify and evaluate the performance of wireless communication networks.(The section provides an excellent evaluation of the performance; a well-round evaluation against the existing techniques)


Conclusion:Summary of the report. (Provide an excellent summary of the assessment; covering all aspects of the assessment)


References:Follow the IEEE Style (The references need to follow IEEE Style; the references and complete)














Answered Same DaySep 28, 2021MITS5003

Answer To: please use the ieee template for assessment 2 In this assessment students are required to research...

Kuldeep answered on Sep 29 2021
154 Votes
4G and 5G cellular systems
Selected article: "Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes"
ABSTRACT
This article provides a comprehensive overview of the existing verification as well as the privacy protection solutions for 4G and 5G mobile networks. This article provides an outline of the existing inv
estigations dealing with 4G and 5G mobile networks. Authors divide the hazard models in the 4G and 5G mobile networks into 4 categories, including an attack on privacy, an attack on integrity, an attack on access, and an attack on authentication. This article also divides resistance measures into three categories, with encryption methods, human factors, as well as intervention detection methods.
Explanation of configuration and related protocols
Although, the countermeasures used in authentication and privacy protection programs, as well as the methods of informal as well as formal security analysis, are brief in tabular form. The classification of identity and the privacy models, we divide these schemes into 7 types for instance, confidentiality authentication, reciprocal authentication, RFID privacy authentication, and confidentiality denial authentication. It contains anonymous verification, authentication and key agreement as well as confidentiality, and verification of the three factors of confidentiality. In addition, we offer a comparison of the classification and authentication of 4G and 5G mobile networks with the privacy protection plans in tabular form. Based on the current investigation, this article will finally discuss some suggestions for further research. This article aims to introduce the security of 4G and 5G mobile networks based on recently published surveys and white papers that emphasis on the authentication as well as privacy issues. The report first briefly introduced the motivations of the new generation of mobile network security and then introduced the structure and security of the 5G system. The arrangement of the threat models in 4Generation and 5Generation mobile networks has been reviewed and discussed in detail; classifications, such as intrusion into privacy, integrity, accessibility and authentication. This article discusses the classification of counterterrorism measures, including cryptographic methods, human factors, and methods of detecting interference.
INTRODUCTION
Compared to fourth-generation technology, 5G has a higher speed, with a capacity of more than 10GB per second, and a larger capacity and a much lower latency, which is the main asset of billions of associated objects in the IoT. In the age of the Internet of Things, 5G will implement a variety of network services (for instance mobile car-to-car communication, cloud computing, data networking, smart networking, smart parking, block-based services and driverless driving). Fully mobile and connected aircraft (UAV) and so on. In a 5G environment, the convergence of the wireless technologies as well as the providers that share a core IP network allows mobile devices to difference between providers as well as technologies to maintain a high level of network openness and easy access, communication security, data privacy, access and confidentiality. Also, since the fifth-generation environment includes IP, it will be exposed to all specific IP vulnerabilities. It is clear that ensuring a high level of the security as well as privacy will be the important aspects of the effective deployment of 5G networks. Because mobile devices are always connected to the network bythe vertical switching, they will have the concept of the social nodes. Such nodes are easier to track and are weaker to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here