Wireless Networks and Security (MN603 Assessment-2) Assignment Help
Assignment Description
This assignment consists of three tasks.
Task 1 Study and analysis two network simulation software tools. Study the latest version of the NS3 simulator tool. Describe the new API and model change history of NS3.
Task 2. Involving analysis and modification of the NS3 lab exercises code. Task 3 It is a case study task. You need to analyze and answer three specific questions.
[Total Marks 55]
________________________________________________________________________________
Task1 [Marks 10+10=20]
Q1. Explore and analyze the following network simulator and write a short comparative study report.
• NS3
• NS2
Q2. What is the latest version of NS3 simulator? What new features are added in the latest version of the NS3 simulator? Write a short report on the Changes from NS-3.38 to the latest version of NS3 simulator. Describe the new API and model change history of NS3.
______________________________________________________________________________
Task 2 [Marks 15]
Q2. Write a Multihop Ad Hoc wireless networks program for simulating in the NS3 simulator. Name the program as your group number. Your program should generate 5 packet captured files. Also give the name of the xml file as “Your Group name.xml.” Execute the program and execute NetAnim for visualization of the performance of your Multihop Ad Hoc program. Take a screenshot of the created .xml file in the NetAnim display. Screenshot of 5 packet captured files that your program generates. Attach the code of your program in the submission report particularly 5 packet captured generation code.
[Hints: You can use Lab-3 task (aodv.cc) program and modify it according to the Task2]
________________________________________________________________________
Task 3 [Marks 25]
Q3. Case Study:
Many wireless devices use wireless technology, yet they lack the necessary security protections. In an Australian Information Security Association (AISA) members gathering in Melbourne a security researcher, who has himself a diabetic, demonstrated a wireless attack on an insulin pump that could change the delivery of the patient. In this gathering another AISA member who is a security vendor found that they can scan a public space from up to 91 meters (300 feet) away, find vulnerable pumps made by a specific medical device manufacturer, and then force these devices to dispense fatal insulin doses.
Based on the above scenario, write a short report and answer the following questions: a) Conduct research on the current state of the attacks on wireless medical devices and proposed defenses to mitigate the attack.
b) Should the vendors who make this wireless medical device be forced to add security to their devices? What should be the penalty if they do not?
c) As per Australian cyber security laws, what should be the penalty for an attacker who manipulates a wireless device.
Source: Book: Security Awareness: Applying Practical Cybersecurity in your world, Mark Ciampa, Cengage.
————————————————-:End of Task:—————————————————
Marking Guide
Marking Rubric for Assignment #2: Total Marks 60