Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018
Assessment Details and Submission Guidelines
Trimester T1 2018
Unit Code MN603
Unit Title Wireless Networks and Security
Assessment
Type
Assignment 2: Group Assignment
Assessment
Title
Design and implementation of secure enterprise wireless network
Purpose of the
assessment
(with ULO
Mapping)
The purpose of this assignment is to design and implement a secure enterprise
wireless network, considering the ethical implications. The assignment covers
the following Unit Learning Outcomes:
d. Apply and evaluate wireless network security techniques in
consideration of ethical implications;
e. Design and implement secure enterprise wireless networks.
Weight 20%
Total Marks 100
Word limit XXXXXXXXXX
Due Date XXXXXXXXXX/05/2018 11:55PM
Submission
Guidelines
ï‚· All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
ï‚· The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.
ï‚· Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension ï‚· If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
ï‚· Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.
http:
www.mit.edu.au/about
http:
www.mit.edu.au/about
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
MN603 Wireless Networks and Security Assignment 2 Page # 2 of 4
Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018
Assignment Description
Enterprise wireless LAN deployments have skyrocketed in recent years, evolving from guest access in
conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the
organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just
plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless
LAN is not hard – industry advances in technology and vendor innovation makes this easier than ever.
Default settings for most access points do not include any form of security being enabled. This is the most
common reason that wireless LANs are hacked or used by unauthorized personnel. When deployed,
immediately turn a method of over-the-air security on.
For enterprises, it is recommended that the most secure over-the-air encryption and authentication method
e used – either IEEE 802.11i or a VPN. IEEE 802.11i, also known as WPA2 when the access point is certified
y the Wi-Fi Alliance, uses IEEE 802.1x for mutual authentication between the client and the network and AES
for data encryption.
Its predecessor was WPA, an interim form of security certified by the Wi-Fi Alliance while the 802.11i standard
was still being ratified. WPA also uses 802.1x for authentication, but TKIP for encryption. While AES is
considered the stronger encryption method, it is worth noting that WPA has never been cracked. 802.11i,
WPA2 and WPA require the use of a RADIUS server to provide the unique, rotating encryption keys to each
client.
This assignment requires the students to design and implement a secure enterprise wireless network,
considering the ethical implications. The students are required to complete the following tasks and submit a
eport on Moodle.
1. Explore the ethical implications in the design and implementation of a secure enterprise wireless
network.
2. Design a secure enterprise wireless network, employing Boson Netsim.
3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the
following aspects:
a. Authorization
. Authentication
c. Integrity
d. Network eavesdropping prevention
4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.
5. Demonstration in Week 11 during the Lab.
The tutor will assign the groups, maximum number of students in a group is 3 and the students in each group
should be from the same lab.
MN603 Wireless Networks and Security Assignment 2 Page # 3 of 4
Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018
Marking criteria:
Section to be included in
the report
Description of the section Marks
Introduction Outline of the report ( in 3-4 sentences) 5
Report Layout Report layout, style and language 5
Explore ethical
implications
Investigate and report the ethical implications in the
design and implementation of a secure enterprise
wireless network
10
Design secure enterprise
wireless network
Design a secure enterprise wireless network, employing
Boson Netsim.
20
Analyse secure
enterprise wireless
network
Analysis of a secure enterprise wireless network using
WPA2 and the RADIUS server, considering the following
aspects:
a. Authorization
. Authentication
c. Integrity
d. Network eavesdropping prevention
20
Implement secure
enterprise wireless
network
Implementation of a secure enterprise wireless network
using WPA2 and the RADIUS server.
20
Demonstration Demonstration in Week 11 during the Lab. 10
Conclusion Write summary of the report 5
Reference style Follow IEEE reference style 5
Total 100
Marking Ru
ic for Assignment #1: Total Marks 10
Grade
Mark
HD
80-100
DI
70-79
CR
60-69
P
50-59
Fail
50
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction
5
All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated
Topics are
elevant and
soundly
analysed.
Generally
elevant and
analysed.
Some relevance
and
iefly
presented.
This is not
elevant to the
assignment
topic.
Report Layout
5
Exceptional report
layout, style and
language used
Very good
eport
layout, style
and
language
used
Good report
layout, style
and language
used
Acceptable
eport layout,
style and
language used.
Poor report
layout, style
and language
used.
Explore ethical
implications
10
Finding is clearly
linked and well
justified
Finding is
clearly
linked and
justified
Finding is
linked and
convincing
Finding is not
linked and
unjustified
Finding is not
available
Design secure
enterprise
wireless
network
Demonstrated
excellent ability to
think critically and
present an
Demonstrat
ed good
ability to
think
Demonstrate d
good ability to
think critically
and present a
Demonstrated
ability to think
critically and
present a design
Did not
demonstrate
ability to think
critically and
MN603 Wireless Networks and Security Assignment 2 Page # 4 of 4
Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa April, 2018
20 exceptional design
considering all the
equirements
critically and
present an
exceptional
design
considering
all the
equirement
s
good design
considering all
the
equirements.
present a
design.
Analyse secure
enterprise
wireless
network
20
Excellent analysis
included WPA2
and RADIUS and
covered all
aspects.
Good
analysis
included
WPA2 and
RADIUS and
covered
some
aspects.
Good analysis
included WPA2
and RADIUS
Some analysis
provided and
included WPA2
and RADIUS
Lacking analysis
of WPA2 and
RADIUS.
Implement
secure
enterprise
wireless
network
20
All elements are
present and very
well integrated.
Components
present with
good
cohesive
Components
present and
mostly well
integrated
Most
components
present
Proposal lacks
structure.
Demonstration
10
Logic is clear and
easy to follow with
strong arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Demonstration
is confused and
disjointed
Conclusion
5
Logic is clear and
easy to follow with
strong arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Reference style
5
Clear styles with
excellent source of
eferences.
Clear
eferencing
style
Generally good
eferencing
style
Sometimes
clear
eferencing
style
Lacks
consistency
with many
e
ors