MN603-T2-2019-Assignment2-Wireless Networks and Security

Solution

Task title: Design, analyze and implement a secure smart home WLAN and secure enterprise WLAN

Subject code: MN603

Objective: To design, analyze and implement a secure smart home WLAN and secure enterprise WLAN.

Overview: For this part of assignment, students are required to provide the proper design, analysis, as well as implementation of the secure smart home WLAN and to perform several tests. The home automation system is required to implement through the use of cisco packet tracer which is a simulation software. Students are required to perform a test analysis in order to control several devices related to the internet of things. Additionally, there is a need to use wireless local area network in order to focus on the areas of security.

University: Melbourne institute of technology

Tool requirement: Cisco packet tracer

Task deliverables

Introduction: This part of assignment provides the detailed description of the assignment and the overview of several innovations used in the assignment.

Ethical implications:  This comprises of ethical implications related to development and building of IOT home network including the several ethics based on the devices of the internet of things.

Design and analysis: The design and implications of the IOT home comprises of the design through cisco packet tracer including the home and remote locations.

Implementation: In this part, the home network connections and other network connections are provided along with screenshots.

Description of safety aspect: Several safety equipment used in the assignment.

Testing: For the testing of network.

Conclusion: To conclude the overall report.

Sample output

 

Proposed modification

The web application test can be done through the several applications and appliances which are used in the designing of the network. Function test is important to perform.

Expert’s comments

There should be screenshots for the designing of a network including the devices. Students are required to have proper understanding on each and every type of testing. With us, students do not need to worried about the testing techniques and addressing schemes.

Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha August , 2019 Assessment Details and Submission Guidelines Trimester T2 2019 Unit Code MN603 Unit Title Wireless Networks and Security Assessment Type Group Assignment (4 Students in a Group) Assessment Title Design, analyse, and implement a secure smart home WLAN and a secure enterprise WLAN. Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering the ethical implications. The assignment covers the following Unit Learning Outcomes: d. Apply and evaluate wireless network security techniques in consideration of ethical implications; e. Design and implement secure ent erprise wireless networks. Weight 20% Total Marks 100 Word limit 2000 - 2500 Due Date 29 /09 /201 9 11:55PM Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11 -pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a refer ence list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS . You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about -mit/institute -publications/policies - procedures -and -guidelines/special considerationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a wr itten warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about -mit/institute -publications/policies - procedures -and -guidelines/Plagiarism -Aca demic -Misconduct -Policy - Procedure . For further information , please refer to the Academic Integrity Section in your Unit Description. MN603 Wireless Networks and Security Page # 2 of 4 Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha August, 2019 Assignment Description Smart home or home automation technology provides homeowners’ security, comfort, convenience and energy efficiency by enabling them to control smart devices, via an app on their smartphone or other networked device. This technology enables you doing things such as turn the lights on/off, stream music to a speaker, lock/open the doors remotely, an d much more. This assignment aims to simulate a smart home using IoT technology in Cisco Packet Tracer. Students will purely practice with the IoT component offered by the Cisco Packet Tracer to be used in the home. Those IoT devices will be connected to the home WL AN that enables the users to control the things through wireless technology. The users should also be able to control the things when they are outside home (remote access). This means the WL AN should be connected to a global network that enables the users to have control on devices when they are at work. Hence, there is another WL AN at work that is connected to the global network. Note, you need to make sure that the WL ANs are secure. This ass ignment requires the students to design , analyse, and implement a smart home , considering the ethical implications. The students are required to complete the following tasks and submit a report on Moodle. 1. Explore the ethical implications in the design and implementation of WL AN s. 2. Design, analysis, and impl ementation of a smart home WLAN and an enterprise WLAN where the following aspects of security should be considered : a. Confidentiality b. Integrity c. Availability d. Authentication e. Authorization 3. Test and prove a successful of connectivity between users and IoT devices when they are at home and when they are at work . You n eed to take a snapshot for each step of testing followed by the explanation. 4. Demonstration in Week 11 during the Lab. The tutor will assign the groups, maximum number of students in a group is 4 and the students in each group should be from the same lab. SPARKPLUS  SPARKPLUS is Self and Peer Assessment and Feedback for group assignment. It is an individual and compulsory task for each student. SPARKPLUS RPF factor is a value between 0 and 1 which is generated by the SPARKPLUS website as soon as the group members do the SPARKPLUS review task. Please read Student’s SPARKPLUS Guideline in the assignment folder for how to use it. Login address: https://mit.sparkplus.com.au/login.php MN603 Wireless Networks and Security Page # 3 of 4 Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha August, 2019 Marking criteria: Section to be included in the report Description of the section Marks Abstract Summarize the objective of the project and the outcome 5 Introduction Introduction of smart home and security challenges 5 Explore ethical implications Investigate and report the ethical implications in the design and implementation of a secure enterprise wireless network 10 Design, analysis, and implementation of smart home and enterprise WLANs Design, Analysis, and implementation of a smart home and enterprise WLAN 15 Design, analysis, and implementation of security in both smart home and enterprise WLAN s Design, Analysis, and implementation of both smart home and enterprise wireless networks, considering the following aspects: a. Confidentiality b. Integrity c. Availability d. Authentication e. Authorization 15 Testing Test and prove a successful of connectivity between users and IoT devices when they are at home and when they are at work. You n eed to take a snapshot for each step of testing followed by the explanation. 15 Conclusion Write summary of the report highlighting the positive and negative points 5 Reference style Follow IEEE reference style and format 5 Appendix You need to upload t he packet tracer file (.pka) 5 Report Layout Report layout, style and language 5 Demonstration Demonstration in Week 11 during the Lab. 15 Total 10 0 MN603 Wireless Networks and Security Page # 4 of 4 Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha August, 2019 Marking Rubric for Assignment #2: Total Marks 1 00 Grade Mark HD 80 -100 DI 70 -79 CR 60 -69 P 50 -59 Fail <50 Excellent Very Good Good Satisfactory Unsatisfactory Abstract /5 Accurately PLUS concisely conveys the project topic, methods and outcomes Accurately conveys the project topic, methods and outcomes Accurately conveys the project topic, methods Accurately conveys the project topic Unsatisfactorily or unclearly conveys the project topic Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Explore ethical implications /10 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available Design, analysis, and implementati on of both home and enterprise WLAN /15 Demonstrated excellent ability to think critically and present an exceptional design considering all the requirements Demonstrat ed good ability to think critically and present an exceptional design considering all the requirement s Demonstrate d good ability to think critically and present a good design considering all the requirements. Demonstrated ability to think critically and present a design Did not demonstrate ability to think critically and present a design. Design, analysis, and implementati on of security in both home and enterprise WLAN /15 Excellent analysis included WPA, WPA2 and RADIUS and covered all aspects. Good analysis included WPA, WPA2 and RADIUS and covered some aspects. Good analysis included WPA, WPA2 and RADIUS Some analysis provided and included WPA, WPA2 and RADIUS Lacking analysis of WPA, WPA2 and RADIUS. Testing /15 Testing was successful between client and AP. All required snapshots attached Testing was successful between client and AP. Some snapshots attached Testing was successful between client and AP. Few required snapshots attached Testing was partially successful between client and AP. All required snapshots attached Testing was not successful. MN603 Wireless Networks and Security Page # 5 of 4 Prepared by: Dr Saeid Iranmanesh Moderated b y: Dr Sanjeeb Shrestha August, 2019 Conclusion /5 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostl y consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Appendix /5 The PKA file is attached and demonstrated The PKA file is not attached but demonstrated The PKA file is not attached and not demonstrated Report Layout /5 Exceptional report layout, style and language used Very good report layout, style and language used Good report layout, style and language used Acceptable report layout, style and language used. Poor report layout, style and language used. Demonstration /15 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Demonstration is confused and disjointed