Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018 Assessment Details and Submission Guidelines Trimester T3 2018 Unit Code MN502 Unit Title Overview of Network Security...

1 answer below »
Assignment and marking criteria added in that


Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018 Assessment Details and Submission Guidelines Trimester T3 2018 Unit Code MN502 Unit Title Overview of Network Security Assessment Type Individual Assessment Assessment Title Lightweight cryptography (Assignment one) Purpose of the assessment (with ULO Mapping) Students should be able to demonstrate their achievements in the following unit learning outcome: b. Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems Weight 15% Total Marks 80 Word limit 1500 - 2000 Due Date Wednesday 02/01/2019, 11:55 PM Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure MN502 Overview of Network Security Page 2 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018 Assignment Description The majority of modern cryptographic algorithms were designed for desktop/server environments, many of these algorithms could not be implemented in the low-power devices used in applications such as automotive systems, sensor networks, healthcare, distributed control systems, the Internet of Things (IoT), cyber-physical systems, and the smart grid. Security and privacy is important in all of these areas. The lightweight cryptography has the goal of providing cryptographic solutions that need to maintain the resource vs security constraint. In this context write a report including the following sections: A. Introduction about the lightweight cryptography and its goals B. The potential security threats in systems using low-power devices C. The working mechanism of lightweight cryptography D. Performance metrics (Hardware-specific metrics and Software-specific metrics) E. Lightweight cryptographic algorithms F. Current and Future challenges in lightweight cryptography G. Conclusion H. References The Viva voce of the assignment will take place during Laboratory session in Week 7. The student has to answer the viva questions related to the assignment. Assignment Instructions:  Do not use Wikipedia as a source or a reference  Must consider at least five current references from journal/conference papers and books. Must follow IEEE referencing style.  Make sure you properly reference any diagrams/ graphics used in the assignment. MN502 Overview of Network Security Page 3 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018 Marking Criteria for the Assignment 1: Marks are allocated as described in the following table. Sections No. Description of the section Marks Introduction Introduction about the lightweight cryptography and its goals. This section should also describe the report outline. 10 Security Threats Discuss three potential security threats in systems using low- power devices 12 Working Mechanism The working mechanism of lightweight cryptography 08 Performance Metrics Discuss in detail the performance metrics  Hardware-specific metrics  Software-specific metrics 10 Algorithms Explain any two lightweight cryptographic algorithms from current literature 10 Challenges Current and Future challenges in lightweight cryptography 10 Conclusion This section concludes the overall findings and contributions of the report 05 References Must follow IEEE style 05 Viva voce Student must appropriately answer the viva questions related to the assignment. 10 Total Marks 80 MN502 Overview of Network Security Page 4 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018 Example Marking Rubric for Assignment #: Total Marks 80 Grade Mark HD 80% + D 70%-79% CR 60%-69% P 50%-59% Fail<50% excellent very good good satisfactory unsatisfactory introduction /10 a very detailed and very clear discussion a well written and clear discussion . generally good discussion . very brief discussion and missing report outline poor introduction with irrelevant details potential security threats /12 a very clear and in-depth discussion about three potential threats very clear discussion about three potential threats generally good discussion about three potential threats brief discussion about the potential threats poor discussion about potential threats with irrelevant information working mechanism /08 a very detailed and very clear working mechanism of the lightweight cryptography very clear working mechanism of the lightweight cryptography generally good discussion about working mechanism of the lightweight cryptography brief discussion about working mechanism of the lightweight cryptography poor discussion with irrelevant information performance metrics /10 an in-depth and very clear discussion about the performance metrics very clear discussion about the performance metrics generally good discussion about the performance metrics brief discussion about the performance metrics irrelevant discussion about the performance metrics algorithms /10 excellent discussion about two lightweight cryptographic algorithms very good discussion about two lightweight cryptographic algorithms good discussion about two lightweight cryptographic algorithms brief discussion about two lightweight cryptographic algorithms unsatisfactory discussion challenges /10 a very clear and in-depth discussion very clear discussion generally good discussion brief discussion poor discussion with irrelevant information conclusion /5 a section very clearly concludes the overall contribution. a section clearly concludes the overall contribution. generally good conclusion of the report brief conclusion of the report with some relevance conclusion not relating to the report references /5 clear styles with excellent source of references. clear referencing/ style generally good referencing/style unclear referencing/style lacks consistency with many errors. viva voce /10 answered all the questions appropriately and accurately answered all the questions with some clarity answered all the questions with little in-depth knowledge answered about 50% of the questions. answers were irrelevant excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 10="" a="" very="" detailed="" and="" very="" clear="" discussion="" a="" well="" written="" and="" clear="" discussion="" .="" generally="" good="" discussion="" .="" very="" brief="" discussion="" and="" missing="" report="" outline="" poor="" introduction="" with="" irrelevant="" details="" potential="" security="" threats="" 12="" a="" very="" clear="" and="" in-depth="" discussion="" about="" three="" potential="" threats="" very="" clear="" discussion="" about="" three="" potential="" threats="" generally="" good="" discussion="" about="" three="" potential="" threats="" brief="" discussion="" about="" the="" potential="" threats="" poor="" discussion="" about="" potential="" threats="" with="" irrelevant="" information="" working="" mechanism="" 08="" a="" very="" detailed="" and="" very="" clear="" working="" mechanism="" of="" the="" lightweight="" cryptography="" very="" clear="" working="" mechanism="" of="" the="" lightweight="" cryptography="" generally="" good="" discussion="" about="" working="" mechanism="" of="" the="" lightweight="" cryptography="" brief="" discussion="" about="" working="" mechanism="" of="" the="" lightweight="" cryptography="" poor="" discussion="" with="" irrelevant="" information="" performance="" metrics="" 10="" an="" in-depth="" and="" very="" clear="" discussion="" about="" the="" performance="" metrics="" very="" clear="" discussion="" about="" the="" performance="" metrics="" generally="" good="" discussion="" about="" the="" performance="" metrics="" brief="" discussion="" about="" the="" performance="" metrics="" irrelevant="" discussion="" about="" the="" performance="" metrics="" algorithms="" 10="" excellent="" discussion="" about="" two="" lightweight="" cryptographic="" algorithms="" very="" good="" discussion="" about="" two="" lightweight="" cryptographic="" algorithms="" good="" discussion="" about="" two="" lightweight="" cryptographic="" algorithms="" brief="" discussion="" about="" two="" lightweight="" cryptographic="" algorithms="" unsatisfactory="" discussion="" challenges="" 10="" a="" very="" clear="" and="" in-depth="" discussion="" very="" clear="" discussion="" generally="" good="" discussion="" brief="" discussion="" poor="" discussion="" with="" irrelevant="" information="" conclusion="" 5="" a="" section="" very="" clearly="" concludes="" the="" overall="" contribution.="" a="" section="" clearly="" concludes="" the="" overall="" contribution.="" generally="" good="" conclusion="" of="" the="" report="" brief="" conclusion="" of="" the="" report="" with="" some="" relevance="" conclusion="" not="" relating="" to="" the="" report="" references="" 5="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing/="" style="" generally="" good="" referencing/style="" unclear="" referencing/style="" lacks="" consistency="" with="" many="" errors.="" viva="" voce="" 10="" answered="" all="" the="" questions="" appropriately="" and="" accurately="" answered="" all="" the="" questions="" with="" some="" clarity="" answered="" all="" the="" questions="" with="" little="" in-depth="" knowledge="" answered="" about="" 50%="" of="" the="" questions.="" answers="" were="">
Answered Same DayFeb 02, 2021MN502

Answer To: Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018 Assessment Details and...

Ankit answered on Feb 05 2021
161 Votes
Student Id    
                    Student Name
                    Lightweight cryptography
Introduction
As world is developing electronically latest gadgets are likewise getting created that consist of good battery and great performance, constrained assets, execution time. The New threats are moreover occurred on this type of gadgets hence there is a need to give more thoughtful privacy and
security. In market, previous cryptography algorithms give great safety however consumes high battery power. So there is requirement of designing good encryption algorithm with high security and consume less battery power. Lightweight cryptography algorithm fulfils the needs of this. [2]
The primary goal of lightweight cryptography algorithm is to give high security for gadgets with constrained assets. These gadgets with constrained assets deploy lightweight ciphers that are genuine and need less power consumption and less computation. The lightweight cipher is developed with quick encryption rate and little utilization of assets. While designing of lightweight cryptographic algorithm, it is a tradeoff among performance and assets needed for a provided security level. The word Performance is described as power and energy consumption, latency and output.
This algorithm is deployed in lesser costs and for little energy consumption in comparison to old cryptography algorithms that supposed to have different apps such as medical assets and on-vehicle gadgets. It is frequently difficult for experts without mastery to misuse this innovation by picking a legitimate lightweight cryptographic algorithm and trying it with proper awareness.
The lesser price, lesser energy consumption, lightweight cryptographic methodology is used in gadgets that consist of on-vehicle device and healthcare assets. This will be supposed to become best security techniques that are helpful for producing next-gen network services like IoT ,smart grid and the cyber-physical model. [1]
The potential security threats in systems using low-power devices
There is important role played by security in every area. Most of present day cryptographic algorithms would build for desktop/server conditions, huge numbers of these algorithms are not executed in the low-power gadgets utilized in applications, for example, “automotive frameworks, wireless sensor networks, medical assets, IoT (the Internet of Things), cyber-physical models, and the smart grid.”
There are various security threats in low-power device such as the Internet of Things (IoT). An IoT framework is vulnerable physically, or vulnerable from inside its system or from software’s on the framework, and in conclusion from threats on encryption schemes. IoT is deployed utilizing various available system advances such as RFIDs, Wireless Sensor Networks, distributed control system, Internet and so forth. However, there is a need for a right listing of the threats with the final objective that it typifies the most of the innovative type of dangers, so better protective measures can be produced and actualized for protecting it. Below table shows different security threats or attacks in low-power device: [5]
The working mechanism of lightweight cryptography
S Box (Substitution Box): For lightweight cryptography block ciphers, input data to box s is structure that is basically four bits block that outcome into four bits result from interchange function.
Rounds: The Encryption and decryption algorithm in lightweight cryptography does calculations in different rounds. In every round, there are various subkeys to be used. All these subkeys are created by utilizing key generation algorithm.
SP Network (Substitution and permutation...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here