Reference no: EM132486791
MN603 - Wireless Networks and Security - Melbourne Institute of Technology
Assessment - Analysis of routing protocols in terms of security, QoS, and energy efficiency
The purpose of the assignment is to analyse the routing protocols and evaluate them in terms of security, QoS, and energy efficiency.
Learning Outcome 1: Compare standards-based technologies used in various networks;
Learning Outcome 2: Test and evaluate various wireless networks performance;
Part A
Assignment Description
Routing can optimize network performance such as delivery ratio, delivery delay, and overhead. In other words, routing determines the sequence of transmitting nodes and the number of packets transmitted by each node. Transmitting nodes and the number of their transmissions influence the generated interference.
Routing in wireless sensor networks (WSN) is very challenging due to the inherent characteristics that distinguish these networks from other wireless networks like mobile ad hoc networks or cellular networks. Routing protocols in WSN might differ depending on the application and network architecture. In this assignment, students will investigate on two clustering based protocols, Low- Energy Adaptive Clustering Hierarchy (LEACH) and Power-Efficient GAthering in Sensor Information System (PEGASIS) in Wirelessnetworks. LEACH and PEGASIS are clustering based protocol to collected data from wireless network.
The students are required to submit a report including technical details on
• Routing mechanism
• How these protocols can be used to reduce energy consumption
• Advantages and limitations of using these protocols in WSNs
Part B
In part B Students are required to continue their investigation on both routing protocol and submit a report covering following aspects of these routing protocols:
1) Highlight Security issues of the routing protocols
2) Discuss the attacks that may happen while operating on these routing protocols
3) How to countermeasure the attacks discussed in 2?
4) Comparative analysis on performance of the routing protocols.
Attachment:- Wireless Networks and Security.rar