Overview of network security

Anonymous
timer Asked: Dec 18th, 2018
account_balance_wallet $20

Question description

Light weight cryptography and plagiarism free dead line is 22nd December with good structure of 1500 to 2000 word's.

Assessment Details and Submission Guidelines Trimester T3 2018 Unit Code MN502 Unit Title Overview of Network Security Assessment Type Individual Assessment Assessment Title Lightweight cryptography (Assignment one) Purpose of the Students should be able to demonstrate their achievements in the following assessment (with unit learning outcome: ULO Mapping) b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems Weight 15% Total Marks 80 Word limit 1500 - 2000 Due Date Wednesday 02/01/2019, 11:55 PM Submission Guidelines Extension Academic Misconduct  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/specialconsiderationdeferment  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/Plagiarism-Academic-Misconduct-PolicyProcedure. For further information, please refer to the Academic Integrity Section in your Unit Description. Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018 MN502 Overview of Network Security Page 2 of 4 Assignment Description The majority of modern cryptographic algorithms were designed for desktop/server environments, many of these algorithms could not be implemented in the low-power devices used in applications such as automotive systems, sensor networks, healthcare, distributed control systems, the Internet of Things (IoT), cyber-physical systems, and the smart grid. Security and privacy is important in all of these areas. The lightweight cryptography has the goal of providing cryptographic solutions that need to maintain the resource vs security constraint. In this context write a report including the following sections: A. Introduction about the lightweight cryptography and its goals B. The potential security threats in systems using low-power devices C. The working mechanism of lightweight cryptography D. Performance metrics (Hardware-specific metrics and Software-specific metrics) E. Lightweight cryptographic algorithms F. Current and Future challenges in lightweight cryptography G. Conclusion H. References The Viva voce of the assignment will take place during Laboratory session in Week 7. The student has to answer the viva questions related to the assignment. Assignment Instructions:  Do not use Wikipedia as a source or a reference  Must consider at least five current references from journal/conference papers and books. Must follow IEEE referencing style.  Make sure you properly reference any diagrams/ graphics used in the assignment. Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018 MN502 Overview of Network Security Page 3 of 4 Marking Criteria for the Assignment 1: Marks are allocated as described in the following table. Sections No. Description of the section Marks Introduction Introduction about the lightweight cryptography and its goals. 10 This section should also describe the report outline. Security Discuss three potential security threats in systems using low- 12 Threats power devices Working The working mechanism of lightweight cryptography 08 Discuss in detail the performance metrics 10 Mechanism Performance Metrics Algorithms  Hardware-specific metrics  Software-specific metrics Explain any two lightweight cryptographic algorithms from 10 current literature Challenges Current and Future challenges in lightweight cryptography 10 Conclusion This section concludes the overall findings and contributions 05 of the report References Viva voce Must follow IEEE style 05 Student must appropriately answer the viva questions related 10 to the assignment. Total Marks Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch 80 November, 2018 MN502 Overview of Network Security Page 4 of 4 Example Marking Rubric for Assignment #: Total Marks 80 Grade Mark Introduction /10 Potential Security threats /12 Working Mechanism /08 Performance Metrics /10 Algorithms /10 Challenges /10 Conclusion /5 References /5 Viva voce /10 HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory A very detailed and very clear discussion A well written and clear discussion . Generally good discussion . Very brief discussion and missing report outline Poor Introduction with irrelevant details A very clear and in-depth discussion about three potential threats Very clear discussion about three potential threats Generally good discussion about three potential threats Brief discussion about the potential threats Poor discussion about potential threats with irrelevant information A very detailed and very clear working mechanism of the lightweight cryptography Very clear working mechanism of the lightweight cryptography Generally good discussion about working mechanism of the lightweight cryptography Brief discussion about working mechanism of the lightweight cryptography Poor discussion with irrelevant information An in-depth and very clear discussion about the performance metrics Very clear discussion about the performance metrics Generally good discussion about the performance metrics Brief discussion about the performance metrics Irrelevant discussion about the performance metrics Excellent discussion about two lightweight cryptographic algorithms Very good discussion about two lightweight cryptographic algorithms Good discussion about two lightweight cryptographic algorithms Brief discussion about two lightweight cryptographic algorithms Unsatisfactory discussion A very clear and in-depth discussion Very clear discussion Generally good discussion Brief discussion Poor discussion with irrelevant information A section very clearly concludes the overall contribution. A section clearly concludes the overall contribution. Generally good conclusion of the report Brief conclusion of the report with some relevance Conclusion not relating to the report Clear styles with excellent source of references. Clear referencing/ style Generally good referencing/style Unclear referencing/style Lacks consistency with many errors. Answered all the questions appropriately and accurately Answered all the questions with some clarity Answered all the questions with little in-depth knowledge Answered about 50% of the questions. Answers were irrelevant Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018

Tutor Answer

DonKobong
School: New York University

Attached.

Running head: LIGHTWEIGHT CRYPTOGRAPHY

Lightweight cryptography
Name
Institution

LIGHTWEIGHT CRYPTOGRAPHY
Introduction
Cryptography refers to the process that involves a combination of the decryption and
encryption according to Andreeva, [1]. The process encompasses a plain text information being
converted into cipher text or unintelligible text and then back to the plain text. However, when a
combination of security and lightweight is considered, the process is known as lightweight
cryptography. The high levels of security are achieved using lightweight cryptography by using
only a small computing power [1]. The other notable definition of the lightweight cryptography
is a cryptographic protocol or algorithm tailored for implementation and use in the constrained
environments including the sensors, RFID tags, healthcare devices, contactless smart cards, etc.
The purpose of the lightweight cryptography is to allow a diverse range of modern
applications such as vehicle security systems, smart meters, wireless patient monitoring systems,
the internet of things and the Intelligent Transport systems to perform their respective duties with
relative ease. A wide variety of devices are helped using the lightweight cryptography which can
be implemented in various kinds of software and hardware [2].
Various features are available that assist the lightweight cryptography work optimally.
The features include the stream ciphers, the block ciphers, hash functions and so on. The
contribution of the lightweight cryptography to the security of various smart devices and objects
include its smaller footprint and efficiency [2]. The networks being used should be implemented
more primitively in combination with the lightweight primitives.
The internet of things uses a wide range of lightweight cryptography techniques. A high
number of challenges are faced by the internet of things such as the power, privacy, security,
heterogeneity, scalability, and bandwidth. The main reasons for the adoption of lightweight
cryptography are the applicability to devices having lower resources and the efficiency of the

LIGHTWEIGHT CRYPTOGRAPHY
end-to-end communication. All the benefits of the lightweight cryptography will only be realized
when the lightweight cryptography is standardized. The resource constrained devices such as the
internet of things use the lightweight encryption sector.
The paper is organized as follows. There is a bit of introduction to the lightweight
cryptography and its goals. The paper describes the potential security threats in a system using
the low powered devices and the working mechanism of ...

flag Report DMCA
Review

Anonymous
10/10 would recommend. Responsive and helpful.

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors