Identify and analyse the attack with highest criticality

Assignment Help Computer Network Security
Reference no: EM132083094 , Length: word count:2000

Evaluation of LTE/LTE-A Network Security

Purpose of the assessment (with ULO Mapping)

The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

Reference no: EM132083094

Questions Cloud

What kind of strategies that investor can use : Please help me understand what kind of strategies that investor can use when they are in situations that experience bull markets
Explain the idea of a tradeoff : Explain the idea of a tradeoff and think of an important tradeoff that you have made today.
What is the minimum transfer price : What is the minimum transfer price for the 200,000-unit order that Land would accept if it were willing to maintain the same ROI with the transfer
How to handle their ipv4 or ipv6 traffic : How can a user coordinate with other organizations with which the networks connected to determine how to handle their IPv4 or IPv6 traffic?
Identify and analyse the attack with highest criticality : MN603 - Wireless Networks and Security - Evaluation of LTE/LTE-A Network Security - compare the wireless communication technologies and evaluate the LTE/LTE-A
List the relevant costs and total amount to elite office : Direct Labor $19; Variable Manufacturing Overhead $6; List the relevant costs and total amount to Elite Office Furniture for this special order
Describe the importance of relationship management : Describe the importance of relationship management to the success of an alliance - Analyze HR strategies for promoting a successful alliance
What is division b division segment margin : Next Step Company is a two-division firm and has the following information available for this year: What is Division B division segment margin
What is the angle of friction of the ashover grit : What is the angle of friction of the Ashover Grit - Determine what rock formation is the prime target, select the best possible drilling site

Reviews

len2083094

8/11/2018 1:30:55 AM

Conclusion /4 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len2083094

8/11/2018 1:30:49 AM

LTE/LTE-A Architecture /5 Excellent understanding of LTE/LTE-A Architecture Very good understandi ng of LTE/LTE-A Architecture Good understanding of LTE/LTE-A Architecture Demonstrated adequate understanding of LTE/LTE-A Architecture Poor understanding of LTE/LTE-A architecture Evaluation of LTE/LTE-A Attacks on access and core networks /10 Exceptional evaluation of LTE/LTE attacks on access and core networks Good evaluation of LTE/LTE attacks on access and core networks Evaluation of LTE/LTE attacks on access and core networks Evaluation of a few LTE/LTE attacks on access and core networks Unable to evaluate LTE/LTE attacks on access and core networks Identification and Analysis /7 Identified the attack and provided excellent justification Identified the attack and provided good justification Identified the attack and provided valid justification Identified the attack and failed to provide valid justification Failed, to identify the attack and provide justification

len2083094

8/11/2018 1:30:42 AM

Marking Rubric for Assignment #1: Total Marks 50 Grade Mark HD 48-60 DI 42-47 CR 36-41 P 30-35 Fail <30 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /4 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Report Layout /5 Exceptional report layout, style and language used Very good report layout, style and language used Good report layout, style and language used Acceptable report layout, style and language used. Poor report layout, style and language used. Comparison of cellular networks /12 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len2083094

8/11/2018 1:00:11 AM

LTE/LTE-A Architecture Explore the LTE/LTE-A architecture 5 Evaluation of LTE/LTE-A Attacks on access and core networks Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive. 10 Identification and Analysis Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack. 7 Conclusion Write summary of the report 4 Reference style Follow IEEE reference style 5 Total 60

len2083094

8/11/2018 12:59:56 AM

Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 4 Report Layout Report layout, style and language 5 Comparison of cellular networks Comparison of the existing cellular networks generations in terms of: a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth utilization e. Security techniques and risk 20

len2083094

8/11/2018 12:59:48 AM

• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2083094

8/11/2018 12:59:39 AM

I would need two copies for this assignment and with 0% plagiarism report as well. There is one more requirement for this assignment is that for 2nd question which is "Explore the architecture of LTE/LTE-A" you need to attach image of general architecture of LTE/LTE-A and explanation of that as well. I will let you know if there are any changes to this assignment or not. Thank you.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd