Wireless Networks and Security

Solution

Trimester: T2 2019 Assignment 1

Unit Code: MN603

Assessment Title: Evaluation of 5G Network and the Security

 

 

Overview

The main purpose of the report is to find problems related to 5G technology compared to wireless communication technologies. The report includes proposed solutions that shed light on problems related to 5G technology that can be avoided. Wireless communication standards are also evaluated, and the report compares different generations of networks based on various factors such as security and risk techniques, modulation techniques, communication spectrum, medium access control mechanism, bandwidth and network speed bandwidth utilization. Next, the report also describes the architecture of the 5G network. The identification and analysis of 5G attacks or other problems associated with 5G networks are being investigated along with solutions that have the ability to solve problems or limitations.

Motivation

The theme of this report is to explore the concept of various communications in a wireless network, because 5G is the latest or latest network technology that will replace 4G technology. 5G technology helps ensure greater system capacity, high data transfer speed, lower latency, high connectivity to devices, etc. For more information on this technology, this report is formulated.

Comparison of cellular networks

Comparison of the tools will take place in terms of different factors which are described underneath:

  • Communication Spectrum
  • Modulation Techniques
  • Control mechanism
  • Network speed/Bandwidth utilization
  • Security techniques

The 5G generations will be discussed along with its predecessors such as 2nd, 3rd and 4th Generations

5G Architecture

The 5G network is based on architecture, which is a new ecosystem of business and technological innovations. The 5G network architecture will help support applications in the business and consumer segment, including in healthcare, energy, production, cars, etc. The 5G network architecture includes a system model based on the IP (Internet Protocol) model for mobile devices, as well as interoperability of wireless networks. This system has a user terminal that plays an important role in the 5G network architecture.

Identification and analysis of 5G attacks

The various attacks that can occur such as Eavesdropping attack, Distributed Denial of Service attack, ToRPEDO attack, Denial of service attack, etc will be identified along with the mechanisms

Identification as well as analysis of 5G limitation in network coverage

The limitation will be discussed under this section which will highlight the important issues regarding the 5G technology. These limitations include roaming security concern, unencrypted channel and many more.

Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha July , 201 9 Assessment Details and Submission Guidelines Trimester T2 2019 Unit Code MN603 Unit Title Wireless Networks and Security Assessment Type Individual Assignment 1 Assessment Title Evaluation of 5G Network and the Security Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to compare the 5G wir eless communication technology with the current technologies in the literature and evaluate the 5G network security. Students will be able to complete the following ULOs: a. Compare standards -based technologies used in various networks; b. Test and evaluate various wireless networks performance; Weight 10% Total Marks 70 Word limit 1800 – 2300 words Due Date Week 7, 1/9/2019 11:55PM Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11 -pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list usi ng IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS . You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about -mit/institute -publications/policies - procedures -and -guidelines/special considerationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves fami liar with the full policy and procedure available at: http://www.mit.edu.au/about -mit/institute -public ations/policies - procedures -and -guidelines/Plagiarism -Academic -Misconduct -Policy - Procedure . For further information , please refer to the Academic Integrity Section in your Unit Description. MN603 Wireless Networks and Security Page# 2 of 4 Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha July , 201 9 Assignment Description 5G is the newest mobile network technology that is replacing the current 4G technology by providing high data rate, reduced latency, energy saving, cost reduction, higher system capacity, and massive device connectivity. Mobile service providers are planning t o immigrate to this technol ogy to support the growing number of devices that demand internet access, many of them requiring so much bandwidth in order to function normally that 4G simply doesn't cut it anymore. For further reading , refer to the article “ 5G Cellular User Equipment: From Theory to Practical Hardware Design ” [1] . The article is available on the IEEE Explore plat form, which could be accessed via the Melbourne Institute of Technology Library. The assessment requires the s tudents to identify the challenges in 5G technology compare with the current wireless communication technologies and consider the proposed soluti ons to address the 5G limitations. Evaluate the wireless communication standards for wireless cyber physical systems and internet of t hings. The students are required to submit a report, which includes : 1. Comparison of the existing cellular networks generations (5G, 4G, 3G, and 2G) in terms of: a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth utilization e. Security techniques and risk 2. Explore the architecture of a 5G network 3. Identify and analys e the 5G attacks on the access and core networks. 4. Identify and analyse the issue related to 5G network coverage? What is a solution to address this limitation? References [1] Y. Huo, X. Dong, and W. Xu , " 5G Cellular User Equipment: From Theory to Practical Hardware Design " in IEEE Access, vol. 5 , pp. 13992 - 14010 , 201 7. MN603 Wireless Networks and Security Page# 3 of 4 Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha July , 201 9 Marking criteria: Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 5-6 sentences) 5 Motivation You need to motivate the reader why 5G? 5 Comparison of cellular networks Comparison of the existing cellular networks generations in terms of: a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth utilization e. Security techniques and risk 20 5G Architecture Explore the 5G architecture 10 Identification and Analysis of 5G Attacks Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack. 10 Identification and Analysis of 5G limitation in network coverage Identify and analyse the issue related to 5G network coverage. Justify the reasons and explain a solution taken to address such limitation 10 Conclusion Write summary of the report 5 Reference style Follow IEEE reference style 5 Total 70 Marking Rubric for Assignment #1: Total Marks 70 Grade Mark HD 48 -60 DI 42 -47 CR 36 -41 P 30 -35 Fail <30 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Motivation /5 Exce ptional motivation Very good motivation Good motivation Acceptable motivation Poor motivation Comparison of cellular networks /20 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available 5G Architecture /10 Excellent understanding of 5G Architecture Very good understandi Good understanding Demonstrated adequate understanding Poor understanding MN603 Wireless Networks and Security Page# 4 of 4 Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha July , 201 9 ng of 5G Architecture of 5G Architecture of 5G Architecture of 5G architecture Evaluation of 5G Attacks on access and core networks /10 Exceptional eva luation of 5G attacks on access and core networks Very g ood evaluation of 5G attacks on access and core networks Good Evaluation of 5G attacks on access and core networks Good Evaluation of a few 5G attacks on access and core networks Unable to evaluate 5G attacks on access and core networks Identification and Analysis of 5G limitation in network coverage /10 Exceptional evaluation of 5G network coverage Very good evaluation of 5G network coverage Good evaluation of 5G network coverage Satisfactory evaluation of 5G network coverage Failed, to evaluate 5G network coverage issue Conclusion /5 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors