Demonstrate adequate understanding of LTE/LTE-A Architecture

Demonstrate adequate understanding of LTE/LTE-A Architecture

Assessment Details and Submission Guidelines

Trimester T2 2018

Unit CodeNM360

Unit Title Wireless Networks and Security

Assessment Type

Individual Assignment 1

Assessment Title

Evaluation of LTE/LTE-A Network Security

Purpose of the assessment (with ULO Mapping)

The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:

b. Compare standards-based technologies used in various networks; c. Test and evaluate various wireless networks performance;

Weight 10%

Total Marks 60

Word limit 1500 – 2000 words

Due Date 2/9/2018 11:55PM

Submission Guidelines

 All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.

 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.

 Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment

Academic Misconduct

 Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.

http://www.mit.edu.au/about
http://www.mit.edu.au/about
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
MN603 Wireless Networks and Security Page#2 of 4

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Ghassan Kbar July, 2018

Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential. For further reading, could refer to the article “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey” [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library. The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth utilization e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

References

[1] L. He, Z. Yan and M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey,” in IEEE Access, vol. 6, pp. 4220-4242, 2018.

MN603 Wireless Networks and Security Page#3 of 4

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Ghassan Kbar July, 2018

Marking criteria:

Section to be included in the report

Description of the section Marks

Introduction Outline of the report ( in 3-4 sentences) 4

Report Layout Report layout, style and language 5

Comparison of cellular networks

Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth

utilization e. Security techniques and risk

20

LTE/LTE-A Architecture Explore the LTE/LTE-A architecture 5

Evaluation of LTE/LTE-A Attacks on access and core networks

Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive.

10

Identification and Analysis

Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack.

7

Conclusion Write summary of the report 4

Reference style Follow IEEE reference style 5

Total 60

Marking Rubric for Assignment #1: Total Marks 50

Grade Mark

HD 48-60

DI 42-47

CR 36-41

P 30-35

Fail <30

Excellent Very Good Good Satisfactory Unsatisfactory

Introduction

/4

All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated

Topics are relevant and soundly analysed.

Generally relevant and analysed.

Some relevance and briefly presented.

This is not relevant to the assignment topic.

Report Layout

/5

Exceptional report layout, style and language used

Very good report layout, style and language used

Good report layout, style and language used

Acceptable report layout, style and language used.

Poor report layout, style and language used.

Comparison of cellular

networks /12

Finding is clearly linked and well justified

Finding is clearly linked and justified

Finding is linked and convincing

Finding is not linked and unjustified

Finding is not available

MN603 Wireless Networks and Security Page#4 of 4

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Ghassan Kbar July, 2018

LTE/LTE-A Architecture

/5

Excellent understanding of LTE/LTE-A Architecture

Very good understandi ng of LTE/LTE-A Architecture

Good understanding of LTE/LTE-A Architecture

Demonstrated adequate understanding of LTE/LTE-A Architecture

Poor understanding of LTE/LTE-A architecture

Evaluation of LTE/LTE-A Attacks on

access and core networks

/10

Exceptional evaluation of LTE/LTE attacks on access and core networks

Good evaluation of LTE/LTE attacks on access and core networks

Evaluation of LTE/LTE attacks on access and core networks

Evaluation of a few LTE/LTE attacks on access and core networks

Unable to evaluate LTE/LTE attacks on access and core networks

Identification and Analysis

/7

Identified the attack and provided excellent justification

Identified the attack and provided good justification

Identified the attack and provided valid justification

Identified the attack and failed to provide valid justification

Failed, to identify the attack and provide justification

Conclusion

/4

Logic is clear and easy to follow with strong arguments

Consistency logical and convincing

Mostly consistent logical and convincing

Adequate cohesion and conviction

Argument is confused and disjointed

Reference style

/5

Clear styles with excellent source of references.

Clear referencing style

Generally good referencing style

Sometimes clear referencing style

Lacks consistency with many errors

Order from us and get better grades. We are the service you have been looking for.