Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:b. Compare standar

The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:

b. Compare standards-based technologies used in various networks;

c. Test and evaluate various wireless networks performance;

Assignment Description:

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher 

bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks.

The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In 

order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and 

security threats is essential.

For further reading, could refer to the article “LTE/LTE-A Network Security Data Collection and 

Analysis for Security Measurement: A Survey” [1]. 

The article is available on the IEEE Explore 

platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and 

evaluate the wireless communication standards for wireless cyber physical systems and internet of 

things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum

b. modulation techniques

c. medium access control mechanism 

d. Network speed and bandwidth utilization

e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A 

3. Evaluate the LTE/LTE-A attacks on the access and core networks. 

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken 

to address such attack.

References

[1] L. He, Z. Yan and M. Atiquzzaman, "LTE/LTE-A Network Security Data Collection and Analysis 

for Security Measurement: A Survey," in IEEE Access, vol. 6, pp. 4220-4242, 2018.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question