Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:b. Compare standar
The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;
Assignment Description:
The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher
bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks.
The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In
order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and
security threats is essential.
For further reading, could refer to the article “LTE/LTE-A Network Security Data Collection and
Analysis for Security Measurement: A Survey” [1].
The article is available on the IEEE Explore
platform, which could be accessed via the Melbourne Institute of Technology Library.
The assessment requires the students to compare wireless communication technologies and
evaluate the wireless communication standards for wireless cyber physical systems and internet of
things. The students are required to submit a report, which includes:
1. Comparison of the existing cellular networks generations in terms of:
a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk
2. Explore the architecture of LTE/LTE-A
3. Evaluate the LTE/LTE-A attacks on the access and core networks.
4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken
to address such attack.
References
[1] L. He, Z. Yan and M. Atiquzzaman, "LTE/LTE-A Network Security Data Collection and Analysis
for Security Measurement: A Survey," in IEEE Access, vol. 6, pp. 4220-4242, 2018.