Assignment title: Information
MN603
Wireless Networks and Security
Assignment 2
Trimester 2, 2016
Assignment 2- Case Study: Group Assignment with individual component Marks will be
based on Individual Contributions.
Report submission due: Tuesday 27th September 2016, 17.00 pm – Week 10 in the
specified submission link on Moodle
Viva Voce – Oral Test (Mandatory) and
Demonstration (For BONUS marks): Weeks 11 and 12 during lab (in the extremely
unlikely case of a group receiving full marks for the assignment their bonus marks will be
null so that the total maximum marks remains at 50.)
Total Marks = 70 (20% of total assessment)- You need to do both the Parts 1 and 2 and
write Reports for each part Contributions made by Each Group Member MUST be clearly
specified in Report
Purpose of the assessment:
The purpose of this assignment is to exercise and develop skills required to design secure
wireless networks, addressing the need of clients. In this assessment, students will be able to
• Apply their knowledge of wireless networking technologies.
• Apply their knowledge of wireless security solutions.
• Decide and choose among competing technologies and products
Description of the assessment:
1. Background
This is a group assignment, with 2-3 members in each group. Lecturer will decide the Group
size based on the class size.
Part 1- Practical Short Project (30 Marks)
Secure Wireless CCTV System
by
Dr Vinod Mirchandani
Your friend Mr Raju has rented a new house in a Melbourne suburb where the number of
robberies (breakins) are high. Raju knows that you are enrolled in MN603 Wireless Security
Unit at MIT. He approaches you to help him out by you creating a secure wireless CCTV
camera based system so that he and his belongings in the house can remain safe Although,
commercial wireless CCTV systems can be obtained from stores like Bunnings and Harvey
Norman they are expensive, require technical knowledge and are beyond the budget of Raju.BN303 Wireless Networks and Security Page 2 of 7
Raju has recently won a new mobile phone in a maths quiz held on Channel 13 of Australia.
As a result Raju's previous phone based on Android OS has become spare. The phone can
operate a WLAN and has good quality camera.
Your mission is to help Raju out with a simple and cost effective way of creating a secure
wireless CCTV system. Raju needs to get the CCTV system operational by you ASAP as he
wants to feel secure in his new property.
You need to carry out some online research of the way in which you can convert Raju's old
phone into a secure wireless CCTV system.
Your group needs to do the following tasks and write a Group Report for Part 1. You MUST
mention in the Report which Tasks were done by each Group Member
1) Research the possible ways of creating such a CCTV system for the above Case study
to help Raju out. Which way would be the best possible approach. Justify your
answer. (5 Marks)
2) Determine and explain the steps by which you can create a secure wireless CCTV
system from Raju's phone. (5 Marks)
3) Draw a diagram of the setup. (5 Marks)
4) Explain the considerations of the place where you will mount Raju's old mobile
phone converted into a CCTV system. (5 Marks)
5) What security protocols you will consider using? Justify your answer? (5 Marks)
6) What are the possible advantages and disadvantages of such a system. (5 Marks)
7) For FIVE (5) BONUS Marks:
If you have a spare phone you can implement such a CCTV camera system for
demonstration.- Note: If you make some very serious mistakes you may loose
functionality of your old phone forever- So, do it at your own risk.
Part 2- Case Study (40 Marks)
Performance Evaluation of Handoff in a Secure and Open 802.11
WLAN network
by Dr Vinod Mirchandani
Your group is employed as wireless security engineers by Emerald Lagoon Hotel to design
and test a 802.11 Wireless LAN network to support traffic generated by the guests in the
hotel. The WLAN network should allow the guests to freely roam around in the corridors and
the lobby and at the same time have access to the hotels WLAN network. This necessitates
the use of proper handoff mechanism to ensure that the guests traffic is seamlessly handed off
between the access points.
The hotel is to offer both an open access authentication to all the guests as a complimentary
service and shared key authentication with suitable security protection for customers who are
interested in having a secure transfer of their information. This service will be offered toBN303 Wireless Networks and Security Page 3 of 7
those customer who are willing to pay. As this is an indoor environment so the RF
propagation characteristics also come into play. So, a proper choice of (preferably)
interoperable WLANs also needs to be made along with suitable antennas in the final
network.
Apart from the above requirements it is important that the handoff time is measured to
determine if it can support a mix of real time and non-real time traffic that is to be generated
by the guests for the both the open as well as the secure network.
Emerald Lagoon hotel is on a tight schedule and budget so your group needs to quickly create
a small testbed using open source tools and software to measure the handoff time. Your group
has been told by your IT department of the hotel that in the past they have used Iperf tool to
emulate the generation of network traffic, Wireshark to sniff the packets and
Tcpdump/Windump to get detailed insight into the MAC frames.
For the above case scenario you should determine the handoff time for UDP traffic generated
at 5-7 different data rates, then TCP traffic for 5-7 different data rates and then for a mix of
TCP and UDP traffic at the same five or seven different data rates.
You need to repeat the above study for Access points using a shared secure key and for the
same traffic types and data rates. Also, a key question that you need to answer from this study
if the handoff time is dependent on the data rates, clients speed and security.
As part of the final design you need to also recommend a suitable authentication mechanism
for the secured key WLAN system in the hotel.
Note: You also need to undertake a serious literature research on tools, security equipment
required and any issues that may arise.
Note: If you don't have access to two Access Points to carry out the above measurements
then try using two Mobile Phones as hot spots.
2. Requirements
Design the network to evaluate the performance of handoff as specified in the above scenario
from scratch. You have to submit a group report and specify each individual group member's
contribution in front page. You should address the following tasks in your report:
Group member one:
• Explain the theory behind handoff in 802.11 WLAN and research the literature for
techniques to measure handoff performance and issues associated with them.
• Create and discuss the experimental setup for the performance measurement in the
above case study with the help of figures.
• Create and discuss the Test plan with the help of Figures and tables to evaluate the
handoff performance. Provide adequate justifications for each step in the plan.
• List the networking, devices and software required including their costs.
Group member two:
• Research the mechanism(s) to support handoffs in 802.11 WLANs proposed by IEEE.BN303 Wireless Networks and Security Page 4 of 7
• Prepare the experimental setup of Group member one – Devices, software installations,
proper allocation of IP addresses, frequencies and connections and the Testing of
connectivity.
• Creation of suitable traffic types and their details such as packet size, transport protocols
used, data rates etc.
• Methodical measurement of performance and its tabulation for both the open access
authentication and shared key case.
Group member three:
• Research the methods by which Quality of Service (QoS) can be provided during handoff in
WLANs.
• Discuss the scenario in which the test was conducted such as the height and orientation of
devices, antenna types, floor plan with distances, show any obstructions, walls, distances
between devices
• Document the work of Group members two and one and prepare a complete report in close
consultation with members 1 and 2.
• Discuss also in the report in the following sections: executive summary, introduction,
theoretical explanation of handoff from Group member 1, research reviews from Group
members 1 and 2, research regarding QoS with mobility in WLANs, test and measurements
(work of group members 1 and 2), major outcomes from the interpretation of the results,
issues and any future tasks.
BONUS MARKS (at week 12 lab):
As a group implement
• To get BONUS marks you have to demonstrate your proposed setup to evaluate the
throughput vs range performance.
3. Guideline for Report Submission and Interview– Assignment Two (2):
Your assignment should be completed according to the General Guidelines for Presentation of
Academic Work. Your report should explain the followings points in detail and MUST clearly
state the parts that were done by each Group member:
• A cover page, identifying student (name and number), teaching staff, and assignment.
• The assignment must use 12 point font size minimum and at least single line spacing
with appropriate section headings.
• Reference sources must be cited in the text of the report, and listed appropriately at the
end in a reference list(Follow IEEE).
• It should follow standard of academic report guidelines.
• The written report should between 6-15 pages in length, with each student contributing
at least five pages regarding their role and findings.
• The report should specify which student (student number and name) in the group did
which specific part of the report.
• Refer to marking criteria for specific components to include.
In addition to your report, you are required to appear for an Oral Test to be conducted by your
Tutor/Lecturer. In this part:BN303 Wireless Networks and Security Page 5 of 7
• Each member of the group will be asked questions pertaining to his/her work and the
overall project.
4. Further instructions:
4.1 Do not PLAGIARISE! Use your own words and design. Use citation and referencing
following IEEE-style to acknowledge the sources you have used in your report for ideas.
4.2 Make sure to properly reference any diagrams/graphics, unless you have created it!
5. Marking Rubric: Total marks for report: 30. Marks are allocated as follows:
Marking for Assignment 2 – Part 2 - (group report) Total Marks=40
Assessment
Components
Description of the section
Report Presentation
(6)
Table of contents, figures, references, the minutes and other
appendices
WLAN handoff theory
and handoff
measurement
(5)
Description & Diagrams explaining the theory of handoff in WLANs and
its measurement methods.
Test plan and devices,
software for
experimental setup
(5)
Create and discuss the Test plan with the help of Figures and tables to
evaluate the handoff performance. Provide adequate justifications for each
step in the plan.
List the networking, devices and software required including their costs
Explanation and
diagram for
Experimental setup
and traffic generation
details
(9)
• Devices, software installations, proper allocation of IP addresses,
frequencies and connections and the Testing of connectivity.
• Creation of suitable traffic types and their details such as packet size,
transport protocols used, data rates etc.
Research of the
methods by which
Quality of Service
(QoS) can be provided
during handoff in
WLANs.
(5)
Research of the methods by which Quality of Service (QoS) can be
provided during handoff in WLANs.
Discuss the scenario in
which the test was
conducted
(5)
Discuss the scenario in which the test was conducted such as the height
and orientation of devices, antenna types, floor plan with distances, show
any obstructions, walls, distances between devices
Interview (5) Clarity of students involvement and understanding of the project
Poor writing Inadequate structure, careless & untidy presentation
Plagiarism Type of plagiarism
- Copy from other student
- Copy from internet source/textbook
- Copy from other sources
Extensions: Approval of extension requests, that were accompanied by supporting
documentation, must be received by the student in writing before 3 working days from the due
date else penalties may apply for late submission without an approved extension.BN303 Wireless Networks and Security Page 6 of 7
Penalties: Academic misconduct such as cheating and plagiarism may incur penalties ranging
from a reduced result to program exclusion.
Student Names & IDs:
Submission Due: …./…../2016
Date Submitted:.…/…../ 2016
Marker's Name: Mark
Achieved
in report
and demo:
/40
HD
80-100%
DI
70-79%
CR
60-69%
P
50-59%
Fail
<50%
Report
Presentation
/6
Table of
contents with
appropriate
section
numbers,
figures,
references and
other
appendices
Table of contents
with appropriate
section numbers,
figures,
references
Table of
contents with
section
numbers,
figures,
references
Table of
contents
and
reference
s
No proper
table of
contents,
figures,
references
WLAN handoff
theory and
handoff
measurement
/5
Adequate
Explanation of
theory and
measurement
Explanation of
most theory and
measurement
Some
Explanation of
theory and
measurement
Little
Explanat
ion of
theory
and
measure
ment
Did not list
Explanation
of theory
and
measureme
nt
Test plan and
devices, software
for experimental
setup
/5
Detail all the
Test plan and
devices,
software for
experimental
setup
Detail most of
Test plan and
devices, software
for experimental
setup
Detail some.
Test plan and
devices, software
for experimental
setup
Detail
very few
Test plan
and
devices,
software
for
experime
ntal
setup
.
Did not
detail most
Test plan
and devices,
software
for
experiment
al setup
Explanation and
diagram for
Experimental
setup and traffic
generation details
/9
all system
components
details and
traffic
generation
details..
most system
components
details and and
traffic generation
details..
Some system
components
details and and
traffic
generation
details..
A few
system
compon
ents
details
and
traffic
generatio
n
details..
The
diagram did
not
included
important
system
component
s.
Research of the
methods by
which Quality of
Service (QoS) can
Detailed
descriptions of
the methods
by which
descriptions of
the methods by
which Quality of
Service (QoS) can
Some
descriptions of
the methods by
which Quality of
Little
descripti
ons of
the
Some
descriptions
only.BN303 Wireless Networks and Security Page 7 of 7
be provided
during handoff in
WLANs.
/5
Quality of
Service (QoS)
can be
provided
during handoff
in WLANs.
be provided
during handoff in
WLANs.
Service (QoS)
can be provided
during handoff
in WLANs.
methods
by which
(QoS)
can be
provided
.
Discuss the
scenario in which
the test was
conducted
/5
Detailed
discussion
Some detail Brief discussion Very
brief
discussio
n
Incomplete
discussion.
Interview
/5
Student has
very good and
clear
understanding
about the
activity
performed in
the project.
Student has good
and clear
understanding
about the activity
performed in the
project.
Student has clear
understanding
about the
activity
performed in the
project.
Student
has
understa
nding
about
the
activity
perform
ed in the
project.
Student is
confused
about the
activity
performed
in the
project.
BONUS marks
for
Demonstration
/10
The
implementatio
n is done very
well
The
implementation is
done well.
The
implementation
is fine
The
impleme
ntation
less...
The
implementa
tion is not
ok..
Poor writing Inadequate structure, careless & untidy presentation -5
Plagiarism Type of plagiarism
- Copy from other student
- Copy from internet source/textbook
- Copy from other sources
-36