Assignment title: Information


MN603 Wireless Networks and Security Assignment 2 Trimester 2, 2016 Assignment 2- Case Study: Group Assignment with individual component Marks will be based on Individual Contributions. Report submission due: Tuesday 27th September 2016, 17.00 pm – Week 10 in the specified submission link on Moodle Viva Voce – Oral Test (Mandatory) and Demonstration (For BONUS marks): Weeks 11 and 12 during lab (in the extremely unlikely case of a group receiving full marks for the assignment their bonus marks will be null so that the total maximum marks remains at 50.) Total Marks = 70 (20% of total assessment)- You need to do both the Parts 1 and 2 and write Reports for each part Contributions made by Each Group Member MUST be clearly specified in Report Purpose of the assessment: The purpose of this assignment is to exercise and develop skills required to design secure wireless networks, addressing the need of clients. In this assessment, students will be able to • Apply their knowledge of wireless networking technologies. • Apply their knowledge of wireless security solutions. • Decide and choose among competing technologies and products Description of the assessment: 1. Background This is a group assignment, with 2-3 members in each group. Lecturer will decide the Group size based on the class size. Part 1- Practical Short Project (30 Marks) Secure Wireless CCTV System by Dr Vinod Mirchandani Your friend Mr Raju has rented a new house in a Melbourne suburb where the number of robberies (breakins) are high. Raju knows that you are enrolled in MN603 Wireless Security Unit at MIT. He approaches you to help him out by you creating a secure wireless CCTV camera based system so that he and his belongings in the house can remain safe Although, commercial wireless CCTV systems can be obtained from stores like Bunnings and Harvey Norman they are expensive, require technical knowledge and are beyond the budget of Raju.BN303 Wireless Networks and Security Page 2 of 7 Raju has recently won a new mobile phone in a maths quiz held on Channel 13 of Australia. As a result Raju's previous phone based on Android OS has become spare. The phone can operate a WLAN and has good quality camera. Your mission is to help Raju out with a simple and cost effective way of creating a secure wireless CCTV system. Raju needs to get the CCTV system operational by you ASAP as he wants to feel secure in his new property. You need to carry out some online research of the way in which you can convert Raju's old phone into a secure wireless CCTV system. Your group needs to do the following tasks and write a Group Report for Part 1. You MUST mention in the Report which Tasks were done by each Group Member 1) Research the possible ways of creating such a CCTV system for the above Case study to help Raju out. Which way would be the best possible approach. Justify your answer. (5 Marks) 2) Determine and explain the steps by which you can create a secure wireless CCTV system from Raju's phone. (5 Marks) 3) Draw a diagram of the setup. (5 Marks) 4) Explain the considerations of the place where you will mount Raju's old mobile phone converted into a CCTV system. (5 Marks) 5) What security protocols you will consider using? Justify your answer? (5 Marks) 6) What are the possible advantages and disadvantages of such a system. (5 Marks) 7) For FIVE (5) BONUS Marks: If you have a spare phone you can implement such a CCTV camera system for demonstration.- Note: If you make some very serious mistakes you may loose functionality of your old phone forever- So, do it at your own risk. Part 2- Case Study (40 Marks) Performance Evaluation of Handoff in a Secure and Open 802.11 WLAN network by Dr Vinod Mirchandani Your group is employed as wireless security engineers by Emerald Lagoon Hotel to design and test a 802.11 Wireless LAN network to support traffic generated by the guests in the hotel. The WLAN network should allow the guests to freely roam around in the corridors and the lobby and at the same time have access to the hotels WLAN network. This necessitates the use of proper handoff mechanism to ensure that the guests traffic is seamlessly handed off between the access points. The hotel is to offer both an open access authentication to all the guests as a complimentary service and shared key authentication with suitable security protection for customers who are interested in having a secure transfer of their information. This service will be offered toBN303 Wireless Networks and Security Page 3 of 7 those customer who are willing to pay. As this is an indoor environment so the RF propagation characteristics also come into play. So, a proper choice of (preferably) interoperable WLANs also needs to be made along with suitable antennas in the final network. Apart from the above requirements it is important that the handoff time is measured to determine if it can support a mix of real time and non-real time traffic that is to be generated by the guests for the both the open as well as the secure network. Emerald Lagoon hotel is on a tight schedule and budget so your group needs to quickly create a small testbed using open source tools and software to measure the handoff time. Your group has been told by your IT department of the hotel that in the past they have used Iperf tool to emulate the generation of network traffic, Wireshark to sniff the packets and Tcpdump/Windump to get detailed insight into the MAC frames. For the above case scenario you should determine the handoff time for UDP traffic generated at 5-7 different data rates, then TCP traffic for 5-7 different data rates and then for a mix of TCP and UDP traffic at the same five or seven different data rates. You need to repeat the above study for Access points using a shared secure key and for the same traffic types and data rates. Also, a key question that you need to answer from this study if the handoff time is dependent on the data rates, clients speed and security. As part of the final design you need to also recommend a suitable authentication mechanism for the secured key WLAN system in the hotel. Note: You also need to undertake a serious literature research on tools, security equipment required and any issues that may arise. Note: If you don't have access to two Access Points to carry out the above measurements then try using two Mobile Phones as hot spots. 2. Requirements Design the network to evaluate the performance of handoff as specified in the above scenario from scratch. You have to submit a group report and specify each individual group member's contribution in front page. You should address the following tasks in your report: Group member one: • Explain the theory behind handoff in 802.11 WLAN and research the literature for techniques to measure handoff performance and issues associated with them. • Create and discuss the experimental setup for the performance measurement in the above case study with the help of figures. • Create and discuss the Test plan with the help of Figures and tables to evaluate the handoff performance. Provide adequate justifications for each step in the plan. • List the networking, devices and software required including their costs. Group member two: • Research the mechanism(s) to support handoffs in 802.11 WLANs proposed by IEEE.BN303 Wireless Networks and Security Page 4 of 7 • Prepare the experimental setup of Group member one – Devices, software installations, proper allocation of IP addresses, frequencies and connections and the Testing of connectivity. • Creation of suitable traffic types and their details such as packet size, transport protocols used, data rates etc. • Methodical measurement of performance and its tabulation for both the open access authentication and shared key case. Group member three: • Research the methods by which Quality of Service (QoS) can be provided during handoff in WLANs. • Discuss the scenario in which the test was conducted such as the height and orientation of devices, antenna types, floor plan with distances, show any obstructions, walls, distances between devices • Document the work of Group members two and one and prepare a complete report in close consultation with members 1 and 2. • Discuss also in the report in the following sections: executive summary, introduction, theoretical explanation of handoff from Group member 1, research reviews from Group members 1 and 2, research regarding QoS with mobility in WLANs, test and measurements (work of group members 1 and 2), major outcomes from the interpretation of the results, issues and any future tasks. BONUS MARKS (at week 12 lab): As a group implement • To get BONUS marks you have to demonstrate your proposed setup to evaluate the throughput vs range performance. 3. Guideline for Report Submission and Interview– Assignment Two (2): Your assignment should be completed according to the General Guidelines for Presentation of Academic Work. Your report should explain the followings points in detail and MUST clearly state the parts that were done by each Group member: • A cover page, identifying student (name and number), teaching staff, and assignment. • The assignment must use 12 point font size minimum and at least single line spacing with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list(Follow IEEE). • It should follow standard of academic report guidelines. • The written report should between 6-15 pages in length, with each student contributing at least five pages regarding their role and findings. • The report should specify which student (student number and name) in the group did which specific part of the report. • Refer to marking criteria for specific components to include. In addition to your report, you are required to appear for an Oral Test to be conducted by your Tutor/Lecturer. In this part:BN303 Wireless Networks and Security Page 5 of 7 • Each member of the group will be asked questions pertaining to his/her work and the overall project. 4. Further instructions: 4.1 Do not PLAGIARISE! Use your own words and design. Use citation and referencing following IEEE-style to acknowledge the sources you have used in your report for ideas. 4.2 Make sure to properly reference any diagrams/graphics, unless you have created it! 5. Marking Rubric: Total marks for report: 30. Marks are allocated as follows: Marking for Assignment 2 – Part 2 - (group report) Total Marks=40 Assessment Components Description of the section Report Presentation (6) Table of contents, figures, references, the minutes and other appendices WLAN handoff theory and handoff measurement (5) Description & Diagrams explaining the theory of handoff in WLANs and its measurement methods. Test plan and devices, software for experimental setup (5) Create and discuss the Test plan with the help of Figures and tables to evaluate the handoff performance. Provide adequate justifications for each step in the plan. List the networking, devices and software required including their costs Explanation and diagram for Experimental setup and traffic generation details (9) • Devices, software installations, proper allocation of IP addresses, frequencies and connections and the Testing of connectivity. • Creation of suitable traffic types and their details such as packet size, transport protocols used, data rates etc. Research of the methods by which Quality of Service (QoS) can be provided during handoff in WLANs. (5) Research of the methods by which Quality of Service (QoS) can be provided during handoff in WLANs. Discuss the scenario in which the test was conducted (5) Discuss the scenario in which the test was conducted such as the height and orientation of devices, antenna types, floor plan with distances, show any obstructions, walls, distances between devices Interview (5) Clarity of students involvement and understanding of the project Poor writing Inadequate structure, careless & untidy presentation Plagiarism Type of plagiarism - Copy from other student - Copy from internet source/textbook - Copy from other sources Extensions: Approval of extension requests, that were accompanied by supporting documentation, must be received by the student in writing before 3 working days from the due date else penalties may apply for late submission without an approved extension.BN303 Wireless Networks and Security Page 6 of 7 Penalties: Academic misconduct such as cheating and plagiarism may incur penalties ranging from a reduced result to program exclusion. Student Names & IDs: Submission Due: …./…../2016 Date Submitted:.…/…../ 2016 Marker's Name: Mark Achieved in report and demo: /40 HD 80-100% DI 70-79% CR 60-69% P 50-59% Fail <50% Report Presentation /6 Table of contents with appropriate section numbers, figures, references and other appendices Table of contents with appropriate section numbers, figures, references Table of contents with section numbers, figures, references Table of contents and reference s No proper table of contents, figures, references WLAN handoff theory and handoff measurement /5 Adequate Explanation of theory and measurement Explanation of most theory and measurement Some Explanation of theory and measurement Little Explanat ion of theory and measure ment Did not list Explanation of theory and measureme nt Test plan and devices, software for experimental setup /5 Detail all the Test plan and devices, software for experimental setup Detail most of Test plan and devices, software for experimental setup Detail some. Test plan and devices, software for experimental setup Detail very few Test plan and devices, software for experime ntal setup . Did not detail most Test plan and devices, software for experiment al setup Explanation and diagram for Experimental setup and traffic generation details /9 all system components details and traffic generation details.. most system components details and and traffic generation details.. Some system components details and and traffic generation details.. A few system compon ents details and traffic generatio n details.. The diagram did not included important system component s. Research of the methods by which Quality of Service (QoS) can Detailed descriptions of the methods by which descriptions of the methods by which Quality of Service (QoS) can Some descriptions of the methods by which Quality of Little descripti ons of the Some descriptions only.BN303 Wireless Networks and Security Page 7 of 7 be provided during handoff in WLANs. /5 Quality of Service (QoS) can be provided during handoff in WLANs. be provided during handoff in WLANs. Service (QoS) can be provided during handoff in WLANs. methods by which (QoS) can be provided . Discuss the scenario in which the test was conducted /5 Detailed discussion Some detail Brief discussion Very brief discussio n Incomplete discussion. Interview /5 Student has very good and clear understanding about the activity performed in the project. Student has good and clear understanding about the activity performed in the project. Student has clear understanding about the activity performed in the project. Student has understa nding about the activity perform ed in the project. Student is confused about the activity performed in the project. BONUS marks for Demonstration /10 The implementatio n is done very well The implementation is done well. The implementation is fine The impleme ntation less... The implementa tion is not ok.. Poor writing Inadequate structure, careless & untidy presentation -5 Plagiarism Type of plagiarism - Copy from other student - Copy from internet source/textbook - Copy from other sources -36