Evaluation of lte/lte-a network security

Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey” [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. 

The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum

b. modulation techniques

c. medium access control mechanism

d. Network speed and bandwidth utilization

e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

References

[1] L. He, Z. Yan and M. Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey,” in IEEE Access, vol. 6, pp. 4220-4242, 2018.

please add these Section to be included in the report: 

1. Introduction:  Outline of the report.

2. Report Layout: Report layout, style and language.

3. Comparison of cellular networks:  Comparison of the existing cellular networks generations in terms of:

     a. Communication spectrum

     b. modulation techniques

     c. medium access control mechanism

     d. Network speed and bandwidth utilization

     e. Security techniques and risk

4. LTE/LTE-A Architecture: Explore and draw the LTE/LTE-A architecture.

5. Evaluation of LTE/LTE-A Attacks on access and core networks : Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive.

6. Identification and Analysis:  Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack.

7. Conclusion:  Write summary of the report 

8. Reference style : Follow IEEE reference style

DOCUMENT FORMAT: The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.

 Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style

Calculate Your Essay Price
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more