Reference no: EM132590427 , Length: word count:1500
MN603 Wireless Networks and Security - Melbourne Institute of Technology
Assessment - Analysis of routing protocols in terms of security, QoS, and energy efficiency
Purpose - The purpose of the assignment is to analyse the routing protocols and evaluate them in terms of security, QoS, and energy efficiency. Students will be able to complete the following ULOs:
a. Compare standards-based technologies used in various networks;
b. Test and evaluate various wireless networks performance;
Part A
Assignment Description
Routing can optimize network performance such as delivery ratio, delivery delay, and overhead. In other words, routing determines the sequence of transmitting nodes and the number of packets transmitted by each node. Transmitting nodes and the number of their transmissions influence the generated interference.
Routing in wireless sensor networks (WSN) is very challenging due to the inherent characteristics that distinguish these networks from other wireless networks like mobile ad hoc networks or cellular networks. Routing protocols in WSN might differ depending on the application and network architecture. In most of the wireless sensor networks, the sensed data or information is far more valuable than the actual node itself. Therefore data centric routing techniques the prime focus is on the transmission of information specified by certain attributes rather than collecting data from certain nodes.
In this assignment, students will investigate on two data centric routing protocols, Sensor protocols for information via negotiation (SPIN) and Directed diffusion (DD).
The students are required to submit a report including technical details on
• Routing mechanism
• Advantages and limitations of using these protocols in WSNs
Part B
In part B Students are required to continue their investigation on both routing protocol and submit a report covering following aspects of these routing protocols:
1) Highlight Security issues of the routing protocols
2) Discuss the attacks that may happen while operating on these routing protocols
3) How to countermeasure the attacks discussed in 2?
4) Comparative analysis on performance of the routing protocols.
Note: minimum 3 journal papers and 3 conference papers (in IEEE format) must be use in analysis and justifications
Attachment:- Wireless Networks and Security.rar