Overview of network security

Hqnlerqql
timer Asked: Dec 17th, 2018

Question Description

Lightweight cryptography free plagarism dead line 25 december must do the assignment as soon as possible and don't dela

Unformatted Attachment Preview

Assessment Details and Submission Guidelines Trimester T3 2018 Unit Code MN502 Unit Title Overview of Network Security Assessment Type Individual Assessment Assessment Title Lightweight cryptography (Assignment one) Purpose of the Students should be able to demonstrate their achievements in the following assessment (with unit learning outcome: ULO Mapping) b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems Weight 15% Total Marks 80 Word limit 1500 - 2000 Due Date Wednesday 02/01/2019, 11:55 PM Submission Guidelines Extension Academic Misconduct  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/specialconsiderationdeferment  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/Plagiarism-Academic-Misconduct-PolicyProcedure. For further information, please refer to the Academic Integrity Section in your Unit Description. Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018 MN502 Overview of Network Security Page 2 of 4 Assignment Description The majority of modern cryptographic algorithms were designed for desktop/server environments, many of these algorithms could not be implemented in the low-power devices used in applications such as automotive systems, sensor networks, healthcare, distributed control systems, the Internet of Things (IoT), cyber-physical systems, and the smart grid. Security and privacy is important in all of these areas. The lightweight cryptography has the goal of providing cryptographic solutions that need to maintain the resource vs security constraint. In this context write a report including the following sections: A. Introduction about the lightweight cryptography and its goals B. The potential security threats in systems using low-power devices C. The working mechanism of lightweight cryptography D. Performance metrics (Hardware-specific metrics and Software-specific metrics) E. Lightweight cryptographic algorithms F. Current and Future challenges in lightweight cryptography G. Conclusion H. References The Viva voce of the assignment will take place during Laboratory session in Week 7. The student has to answer the viva questions related to the assignment. Assignment Instructions:  Do not use Wikipedia as a source or a reference  Must consider at least five current references from journal/conference papers and books. Must follow IEEE referencing style.  Make sure you properly reference any diagrams/ graphics used in the assignment. Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018 MN502 Overview of Network Security Page 3 of 4 Marking Criteria for the Assignment 1: Marks are allocated as described in the following table. Sections No. Description of the section Marks Introduction Introduction about the lightweight cryptography and its goals. 10 This section should also describe the report outline. Security Discuss three potential security threats in systems using low- 12 Threats power devices Working The working mechanism of lightweight cryptography 08 Discuss in detail the performance metrics 10 Mechanism Performance Metrics Algorithms  Hardware-specific metrics  Software-specific metrics Explain any two lightweight cryptographic algorithms from 10 current literature Challenges Current and Future challenges in lightweight cryptography 10 Conclusion This section concludes the overall findings and contributions 05 of the report References Viva voce Must follow IEEE style 05 Student must appropriately answer the viva questions related 10 to the assignment. Total Marks Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch 80 November, 2018 MN502 Overview of Network Security Page 4 of 4 Example Marking Rubric for Assignment #: Total Marks 80 Grade Mark Introduction /10 Potential Security threats /12 Working Mechanism /08 Performance Metrics /10 Algorithms /10 Challenges /10 Conclusion /5 References /5 Viva voce /10 HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Similar Content

Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors