Evaluation of lte-lte-a attacks on access and core networks


Wireless Networks and Security Assignment: Evaluation Of LTE/LTE-A Network Security

Purpose

The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

Length: 1500 - 2000 words.

Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey". The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

References

L. He, Z. Yan and M. Atiquzzaman, "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey," in IEEE Access, vol. 6, pp. 4220-4242, 2018.

Add these Section to be included in the report:

1. Introduction: Outline of the report.

2. Report Layout: Report layout, style and language.

3. Comparison of cellular networks: Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk

4. LTE/LTE-A Architecture: Explore and draw the LTE/LTE-A architecture.

5. Evaluation of LTE/LTE-A Attacks on access and core networks : Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive.

6. Identification and Analysis: Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack.

7. Conclusion: Write summary of the report

8. Reference style : Follow IEEE reference style.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Evaluation of lte-lte-a attacks on access and core networks
Reference No:- TGS02115082

Now Priced at $60 (50% Discount)

Recommended (90%)

Rated (4.3/5)