Solution
Trimester: T2 2019 Assignment 1
Unit Code: MN603
Assessment Title: Evaluation of 5G Network and the Security
|
Overview
The main purpose of the report is to find problems related to 5G technology compared to wireless communication technologies. The report includes proposed solutions that shed light on problems related to 5G technology that can be avoided. Wireless communication standards are also evaluated, and the report compares different generations of networks based on various factors such as security and risk techniques, modulation techniques, communication spectrum, medium access control mechanism, bandwidth and network speed bandwidth utilization. Next, the report also describes the architecture of the 5G network. The identification and analysis of 5G attacks or other problems associated with 5G networks are being investigated along with solutions that have the ability to solve problems or limitations.
Motivation
The theme of this report is to explore the concept of various communications in a wireless network, because 5G is the latest or latest network technology that will replace 4G technology. 5G technology helps ensure greater system capacity, high data transfer speed, lower latency, high connectivity to devices, etc. For more information on this technology, this report is formulated.
Comparison of cellular networks
Comparison of the tools will take place in terms of different factors which are described underneath:
- Communication Spectrum
- Modulation Techniques
- Control mechanism
- Network speed/Bandwidth utilization
- Security techniques
The 5G generations will be discussed along with its predecessors such as 2nd, 3rd and 4th Generations
5G Architecture
The 5G network is based on architecture, which is a new ecosystem of business and technological innovations. The 5G network architecture will help support applications in the business and consumer segment, including in healthcare, energy, production, cars, etc. The 5G network architecture includes a system model based on the IP (Internet Protocol) model for mobile devices, as well as interoperability of wireless networks. This system has a user terminal that plays an important role in the 5G network architecture.

Identification and analysis of 5G attacks
The various attacks that can occur such as Eavesdropping attack, Distributed Denial of Service attack, ToRPEDO attack, Denial of service attack, etc will be identified along with the mechanisms
Identification as well as analysis of 5G limitation in network coverage
The limitation will be discussed under this section which will highlight the important issues regarding the 5G technology. These limitations include roaming security concern, unencrypted channel and many more.
Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha July , 201 9
Assessment Details and Submission Guidelines
Trimester T2 2019
Unit Code MN603
Unit Title Wireless Networks and Security
Assessment
Type
Individual Assignment 1
Assessment
Title
Evaluation of 5G Network and the Security
Purpose of the
assessment
(with ULO
Mapping)
The purpose of the assignment is to compare the 5G wir eless communication
technology with the current technologies in the literature and evaluate the 5G
network security. Students will be able to complete the following ULOs:
a. Compare standards -based technologies used in various networks;
b. Test and evaluate various wireless networks performance;
Weight 10%
Total Marks 70
Word limit 1800 – 2300 words
Due Date Week 7, 1/9/2019 11:55PM
Submission
Guidelines
All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
The assignment must be in MS Word format, 1.5 spacing, 11 -pt Calibri (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.
Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list usi ng IEEE referencing style.
Extension If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS . You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about -mit/institute -publications/policies -
procedures -and -guidelines/special considerationdeferment
Academic
Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
fami liar with the full policy and procedure available at:
http://www.mit.edu.au/about -mit/institute -public ations/policies -
procedures -and -guidelines/Plagiarism -Academic -Misconduct -Policy -
Procedure . For further information , please refer to the Academic Integrity
Section in your Unit Description.
MN603 Wireless Networks and Security Page# 2 of 4
Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha July , 201 9
Assignment Description
5G is the newest mobile network technology that is replacing the current 4G technology by providing
high data rate, reduced latency, energy saving, cost reduction, higher system capacity, and massive
device connectivity. Mobile service providers are planning t o immigrate to this technol ogy to support
the growing number of devices that demand internet access, many of them requiring so
much bandwidth in order to function normally that 4G simply doesn't cut it anymore.
For further reading , refer to the article “ 5G Cellular User Equipment: From Theory to Practical
Hardware Design ” [1] . The article is available on the IEEE Explore plat form, which could be accessed
via the Melbourne Institute of Technology Library.
The assessment requires the s tudents to identify the challenges in 5G technology compare with the
current wireless communication technologies and consider the proposed soluti ons to address the 5G
limitations. Evaluate the wireless communication standards for wireless cyber physical systems and
internet of t hings. The students are required to submit a report, which includes :
1. Comparison of the existing cellular networks generations (5G, 4G, 3G, and 2G) in terms of:
a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk
2. Explore the architecture of a 5G network
3. Identify and analys e the 5G attacks on the access and core networks.
4. Identify and analyse the issue related to 5G network coverage? What is a solution to address
this limitation?
References
[1] Y. Huo, X. Dong, and W. Xu , " 5G Cellular User Equipment: From Theory to Practical Hardware
Design " in IEEE Access, vol. 5 , pp. 13992 - 14010 , 201 7.
MN603 Wireless Networks and Security Page# 3 of 4
Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha July , 201 9
Marking criteria:
Section to be included in
the report
Description of the section Marks
Introduction Outline of the report ( in 5-6 sentences) 5
Motivation You need to motivate the reader why 5G? 5
Comparison of cellular
networks
Comparison of the existing cellular networks
generations in terms of:
a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth
utilization
e. Security techniques and risk
20
5G Architecture Explore the 5G architecture 10
Identification and
Analysis of 5G Attacks
Identify and analyse the attack with highest criticality.
Justify your selection with valid reasoning and explain
the countermeasures taken to address such attack.
10
Identification and
Analysis of 5G limitation
in network coverage
Identify and analyse the issue related to 5G network
coverage. Justify the reasons and explain a solution
taken to address such limitation
10
Conclusion Write summary of the report 5
Reference style Follow IEEE reference style 5
Total 70
Marking Rubric for Assignment #1: Total Marks 70
Grade
Mark
HD
48 -60
DI
42 -47
CR
36 -41
P
30 -35
Fail
<30
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction
/5
All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated
Topics are
relevant and
soundly
analysed.
Generally
relevant and
analysed.
Some relevance
and briefly
presented.
This is not
relevant to the
assignment
topic.
Motivation
/5
Exce ptional
motivation
Very good
motivation
Good
motivation
Acceptable
motivation
Poor
motivation
Comparison of
cellular
networks
/20
Finding is clearly
linked and well
justified
Finding is
clearly
linked and
justified
Finding is
linked and
convincing
Finding is not
linked and
unjustified
Finding is not
available
5G Architecture
/10
Excellent
understanding of
5G Architecture
Very good
understandi
Good
understanding
Demonstrated
adequate
understanding
Poor
understanding MN603 Wireless Networks and Security Page# 4 of 4
Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha July , 201 9
ng of 5G
Architecture
of 5G
Architecture
of 5G
Architecture
of 5G
architecture
Evaluation of
5G Attacks on
access and core
networks
/10
Exceptional
eva luation of 5G
attacks on access
and core networks
Very g ood
evaluation
of 5G
attacks on
access and
core
networks
Good
Evaluation of
5G attacks on
access and core
networks
Good Evaluation
of a few 5G
attacks on
access and core
networks
Unable to
evaluate 5G
attacks on
access and core
networks
Identification
and Analysis
of 5G
limitation in
network
coverage
/10
Exceptional
evaluation of 5G
network coverage
Very good
evaluation
of 5G
network
coverage
Good
evaluation of
5G network
coverage
Satisfactory
evaluation of 5G
network
coverage
Failed, to
evaluate 5G
network
coverage issue
Conclusion
/5
Logic is clear and
easy to follow with
strong arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Reference style
/5
Clear styles with
excellent source of
references.
Clear
referencing
style
Generally good
referencing
style
Sometimes
clear
referencing
style
Lacks
consistency
with many
errors