Compare wireless communication technologies and evaluate


Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things.

The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum

b. modulation techniques

c. medium access control mechanism

d. Network speed and bandwidth utilization

e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

References

[1] L. He, Z. Yan and M. Atiquzzaman, "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey," in IEEE Access, vol. 6, pp. 4220-4242, 2018.

Please add these Section to be included in the report:

1. Introduction: Outline of the report.

2. Report Layout: Report layout, style and language.

3. Comparison of cellular networks: Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum

b. modulation techniques

c. medium access control mechanism

d. Network speed and bandwidth utilization

e. Security techniques and risk

4. LTE/LTE-A Architecture: Explore and draw the LTE/LTE-A architecture.

5. Evaluation of LTE/LTE-A Attacks on access and core networks : Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive.

6. Identification and Analysis: Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack.

7. Conclusion: Write summary of the report

8. Reference style : Follow IEEE reference style

DOCUMENT FORMAT: The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.

Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Compare wireless communication technologies and evaluate
Reference No:- TGS02894208

Now Priced at $55 (50% Discount)

Recommended (96%)

Rated (4.8/5)