Analysis of routing protocols in terms of security

Assignment Help Computer Network Security
Reference no: EM132486791

MN603 - Wireless Networks and Security - Melbourne Institute of Technology

Assessment - Analysis of routing protocols in terms of security, QoS, and energy efficiency

The purpose of the assignment is to analyse the routing protocols and evaluate them in terms of security, QoS, and energy efficiency.

Learning Outcome 1: Compare standards-based technologies used in various networks;
Learning Outcome 2: Test and evaluate various wireless networks performance;

Part A

Assignment Description

Routing can optimize network performance such as delivery ratio, delivery delay, and overhead. In other words, routing determines the sequence of transmitting nodes and the number of packets transmitted by each node. Transmitting nodes and the number of their transmissions influence the generated interference.

Routing in wireless sensor networks (WSN) is very challenging due to the inherent characteristics that distinguish these networks from other wireless networks like mobile ad hoc networks or cellular networks. Routing protocols in WSN might differ depending on the application and network architecture. In this assignment, students will investigate on two clustering based protocols, Low- Energy Adaptive Clustering Hierarchy (LEACH) and Power-Efficient GAthering in Sensor Information System (PEGASIS) in Wirelessnetworks. LEACH and PEGASIS are clustering based protocol to collected data from wireless network.

The students are required to submit a report including technical details on

• Routing mechanism
• How these protocols can be used to reduce energy consumption
• Advantages and limitations of using these protocols in WSNs

Part B

In part B Students are required to continue their investigation on both routing protocol and submit a report covering following aspects of these routing protocols:

1) Highlight Security issues of the routing protocols
2) Discuss the attacks that may happen while operating on these routing protocols
3) How to countermeasure the attacks discussed in 2?
4) Comparative analysis on performance of the routing protocols.

Attachment:- Wireless Networks and Security.rar

Reference no: EM132486791

Questions Cloud

Definition of the words humanism and humanist : Why the scholarship was a monopoly of the church during the Middle Ages.Who were the two most important scholars of the first part of the Renaissance?
How did the US end up getting involved in World War : How did the US end up getting involved in World War I after trying to stay out of it for so long? Once the US entered the war, how did the government try
Defective myostatin protein in cells fails : Defective myostatin protein in cells fails to block the cell cycle in the G1 phase at the appropriate time during development
How shield would have increased the dangers of nuclear war : If you had been a presidential advisor for Presidents Ford and Carter, what economic strategy would you have recommended?
Analysis of routing protocols in terms of security : Analysis of routing protocols in terms of security, QoS, and energy efficiency - Compare standards-based technologies used in various networks
What is zionism : China seems poised to replace the United States as the world's greatest power. What do you think would be the consequences of such a change
What caused the high blood pressure : Explain how a low-salt diet would enable you to determine whether the high blood or the kidney damage came first.
Study of brain anatomy in heterosexual and homosexual men : Recall LeVay's study of brain anatomy in heterosexual and homosexual men. Certain critics have suggested that one or more of the men classified as "heterosexual
Describe how some cells came to have chloroplasts : Describe how some cells came to have chloroplasts, according to the theory of endosymbiosis.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Business case study - Network design proposal for a School

BN202 Internetworking Technologies Assignment - Network Requirement Analysis and Plan, Melbourne Institute of Technology, Australia

  Describe principles in bell-lapadula and biba security model

Describe the fundamental principles in both the Bell-LaPadula and Biba security models. For each, explain what sort of security the model is intended to provide, the two key properties of the model.

  Demonstrate connection to your current work environment

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to you desired work environment.

  What software you recommend be added to the system

For each concern, specify the action to be taken, and if applicable, what software you recommend be added to the system. Justify each of your recommendations.

  What was the total price for the hardware configuration

What was the total price for the hardware configuration you chose? What manufacture did you choose for your replacement computer?

  Limits of information privacy

Question 1: Does the governments have the right to go our information privacy? Question 2: What is the limits of information privacy?

  What is the order of the public key

What is the order of the public key and Which masking keys kM are possible - Decrypt the message without computing Bob's private key

  Discuss the cybercrime or cybersecurity in detail

Please post the hyperlink to one federal statute which discusses cybercrime or cybersecurity on the internet and summarize in not less than 100 words.

  Describe cryptology and impact on cybercrime response

Identify what you perceive to be the five most concerning threats to the network, computing environment, and the database operations of the company - Describe cryptology and impact on cybercrime response.

  Create a security matrix spreadsheet and security strategy

Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected to be created.

  Determine the category of computer crimes

Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time.

  Describe the environment of your forensic workstation

Describe the environment of your forensic workstation and the access to the machine. Describe the procedure that you used to download the image file to your work directory.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd