Wireless Networks and Security

Assessment Details and Submission Guidelines
TrimesterT2 2020
Unit CodeMN603
Unit TitleWireless Networks and Security
Assessment
Type
Group Assignment (Max 5 members per group)
Assessment
Title
Implementation of Wireless networks and performance evaluation
Purpose of the
assessment
(with ULO
Mapping)
The purpose of the assignment is to implement wireless networks in Simulation
environment and analyse the routing protocols, evaluate them in terms of
security, QoS, and energy efficiency. Students will be able to complete the
following ULOs:
a. Analyse and compare wireless communication protocols;
b. Test and evaluate various wireless networks performance;
d. Apply and evaluate wireless network security techniques with
consideration of ethical implications;
e. Design and implement secure enterprise wireless networks
Weight30%
Total Marks100
Word limit2500-3000
Due DateWeek 11, 2nd Oct 2020 Time: 11:59pm
Submission
Guidelines
• All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.
• Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension• If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
• Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policies
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.

MN603 Wireless Networks and Security Page#2 of 4
Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha Aug, 2020
Assignment Description
Task 1
A mobile ad hoc network or MANET does not depend on a fixed infrastructure for its networking
operation. MANET is an autonomous and short-lived association of group of mobile nodes that
communicate with each other over wireless links. A node can directly communicate to the nodes that
lie within its communication range. If a node wants to communicate with a node that is not directly
within its communication range, it uses intermediate nodes as routers.
The students are required to:
1. Create a simulator object in NS-2
2. Set the values for the parameter
3. Open a nam trace file and define finish procedure then close the trace file, and execute nam on
trace file.
4. Create the nodes that forms a network numbered from 0 to 5
5. Schedule events and run the program.
6. Answer the following questions
a) Include screenshots of the NAM displaying the nodes deployed during the simulation and
add screen shots of the simulation.
b) Conduct comparative analysis on the results for packets sent, received, dropped for the
two protocols.
c) Simulate a wormhole attack for the MANET
d) Appendix I should include the tcl script used in each simulation
e) How does Wormhole attack takes place in MANETs?
f) How Wormhole attack can be prevented?
g) Discuss two routing protocols of Adhoc Network.
Task 2
Smart home or home automation technology provides homeowners’ security, comfort, convenience
and energy efficiency by enabling them to control smart devices, via an app on their smartphone or
other networked device. This technology enables you doing things such as turn the lights on/off,
stream music to a speaker, lock/open the doors remotely, and much more.
This task aims to simulate a smart home using Internet of Things (IoT) technology in Cisco Packet
Tracer. Students will purely practice with the IoT component offered by the Cisco Packet Tracer to be
used in the home. Those IoT devices will be connected to the home WLAN that enables the users to
control the things through wireless technology. The users should also be able to control the things
when they are outside home (remote access). This means the WLAN should be connected to a global
network that enables the users to have control on devices when they are at work.
The students are required to complete the following steps:
• Explore the ethical implications in the design and implementation of Wireless Local Area
Networks (WLANs).
• Setup IoT based smart Home using WPA&WPA2 security & Radius server in packet tracer
• Test and prove a successful connectivity between users and IoT devices when they are at
home and when they are outside of home. You need to take a snapshot for each step of
testing followed by the explanation.
MN603 Wireless Networks and Security Page#3 of 4
Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha Aug, 2020
Marking Guide

Section to be included in the
report
Description of the sectionMarks
IntroductionOutline of the report5
Report LayoutReport layout, style and language5
NS – 2 Simulation and network
design
Include screenshots of the NAM
displaying the nodes deployed
during the simulation and add
screen shots of the simulation.
10
Simulation of the Wormhole
attack
10
NS – 2 Trace file analysisProvide a critical analysis of the
trace file in terms of packets sent,
received, dropped. Discuss the
simulation results
10
Discussion on the ad hoc
networks
Answer the questions on the ad
hoc networks
20
Explore ethical
implications
Investigate and report the ethical
implications in the design and
implementation of a secure
wireless LAN
10
Design, analysis, and
implementation of smart
home
Design, Analysis, and
implementation of a smart home
using WLAN
10
TestingConfiguration evidence of
WPA&WPA2 security & Radius
server in packet tracer. Test and
prove a successful connectivity
between users and IoT devices
when they are at home and when
they are outside of home. You
need to take a snapshot for each
step of testing followed by the
explanation.
10
ConclusionWrite summary of the report
highlighting the positive and
negative points
5
Reference styleFollow IEEE reference style and
format
5

MN603 Wireless Networks and Security Page#4 of 4
Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha Aug, 2020
Marking Rubric for Assignment #2: Total Marks 100

Grade
Mark
HD
80-100
DI
70-79
CR
60-69
P
50-59
Fail
<50
ExcellentVery GoodGoodSatisfactoryUnsatisfactory
Introduction/5All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated
Topics are
relevant and
soundly
analysed.
Generally
relevant and
analysed.
Some relevance
and briefly
presented.
This is not
relevant to the
assignment
topic.
Report Layout
/5
Exceptional report
layout, style and
language used
Very good
report
layout, style
and
language
used
Good report
layout, style
and language
used
Acceptable
report layout,
style and
language used
Poor report
layout, style
and language
used
Design of
Networks in NS
– 2
/20
Demonstrated
excellent ability to
think critically and
present an
exceptional design
considering all the
requirements
Demonstrat
ed good
ability to
think
critically and
present an
exceptional
design
considering
all the
requirement
s
Demonstrate d
good ability to
think critically
and present a
good design
considering all
the
requirements.
Demonstrated
ability to think
critically and
present a design
Did not
demonstrate
ability to think
critically and
present a
design.
NS – 2 Trace file
analysis /10
Excellent
understanding and
explanation on
trace file
parameters
Very good
understandi
ng and
explanation
on trace file
parameters
Good
understanding
and
explanation on
trace file
parameters
Demonstrated
understanding
and explanation
on trace file
parameters
Poor
understanding
and explanation
on trace file
parameters
Discussion on
the ad hoc
networks /10
Exceptional Result
Discussion and
comparative
analysis
Very good
Result
Discussion
and
comparative
analysis
Good Result
Discussion and
comparative
analysis
Fair Result
Discussion and
comparative
analysis
Unable to
discuss Results
and do
comparative
analysis
Explore ethical
implications
/10
Finding is clearly
linked and well
justified
Finding is
clearly
linked and
justified
Finding is
linked and
convincing
Finding is not
linked and
unjustified
Finding is not
available
Design,
analysis, and
implementation
of smart home
and enterprise
WLANs /10
Demonstrated
excellent ability to
think critically and
present an
exceptional design
considering all the
requirements
Demonstrat
ed
good
ability to
think
critically and
present an
exceptional
design
Demonstrate d
good ability to
think critically
and present a
good design
considering all
the
requirements.
Demonstrated
ability to think
critically and
present a design
Did not
demonstrate
ability to think
critically and
present a
design.

MN603 Wireless Networks and Security Page#5 of 4
Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha Aug, 2020

considering
all the
requirement
s
Testing /10Testing was
successful between
client and Access
Point (AP). All
required snapshots
attached
Testing was
successful
between
client and
AP. Some
snapshots
attached
Testing was
successful
between client
and AP. Few
required
snapshots
attached
Testing was
partially
successful
between client
and AP. All
required
snapshots
attached
Testing was not
successful.
Conclusion
/5
Logic is clear and
easy to follow with
strong arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Reference style
/5
Clear styles with
excellent source of
references.
Clear
referencing
style
Generally good
referencing
style
Sometimes
clear
referencing
style
Lacks
consistency
with many
errors