Academic Writing Experts For Your Research Projects

Order custom papers, masters thesis and dissertation in 3 guided steps; human written!

Posted: November 6th, 2022

MN502

Trimester T3 2018
Unit Code MN502
Unit Title Overview of Network Security
Assessment Type Individual Assessment
Assessment Title Lightweight cryptography (Assignment one)
Purpose of the
assessment (with
ULO Mapping)
Students should be able to demonstrate their achievements in the following
unit learning outcome:
b. Analyse and discuss common emerging threats, attacks, mitigation
and countermeasures in networked information systems
Weight 15%
Total Marks 80
Word limit 1500 - 2000
Due Date Wednesday 02/01/2019, 11:55 PM
Submission
Guidelines
 All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri
(Body) font and 2.54 cm margins on all four sides of your page with
appropriate section headings.
 Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension  If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
 Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to
exclusion from the course or rescinding the degree. Students should make
themselves familiar with the full policy and procedure available at:
http://www.mit.edu.au/about-mit/institute-publications/policies procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.
MN502 Overview of Network Security Page 2 of 4
Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018
Assignment Description
The majority of modern cryptographic algorithms were designed for desktop/server
environments, many of these algorithms could not be implemented in the low-power devices
used in applications such as automotive systems, sensor networks, healthcare, distributed
control systems, the Internet of Things (IoT), cyber-physical systems, and the smart grid.
Security and privacy is important in all of these areas. The lightweight cryptography has the
goal of providing cryptographic solutions that need to maintain the resource vs security
constraint.
In this context write a report including the following sections:
A. Introduction about the lightweight cryptography and its goals
B. The potential security threats in systems using low-power devices
C. The working mechanism of lightweight cryptography
D. Performance metrics (Hardware-specific metrics and Software-specific metrics)
E. Lightweight cryptographic algorithms
F. Current and Future challenges in lightweight cryptography
G. Conclusion
H. References
The Viva voce of the assignment will take place during Laboratory session in Week 7. The
student has to answer the viva questions related to the assignment.
Assignment Instructions:
 Do not use Wikipedia as a source or a reference
 Must consider at least five current references from journal/conference papers and
books. Must follow IEEE referencing style.
 Make sure you properly reference any diagrams/ graphics used in the assignment.
MN502 Overview of Network Security Page 3 of 4
Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018
Marking Criteria for the Assignment 1:
Marks are allocated as described in the following table.
Sections No. Description of the section Marks
Introduction Introduction about the lightweight cryptography and its goals.
This section should also describe the report outline.
10
Security
Threats
Discuss three potential security threats in systems using low power devices
12
Working
Mechanism
The working mechanism of lightweight cryptography 08
Performance
Metrics
Discuss in detail the performance metrics
 Hardware-specific metrics
 Software-specific metrics
10
Algorithms Explain any two lightweight cryptographic algorithms from
current literature
10
Challenges Current and Future challenges in lightweight cryptography 10
Conclusion This section concludes the overall findings and contributions
of the report
05
References Must follow IEEE style 05
Viva voce Student must appropriately answer the viva questions related
to the assignment.
10
Total Marks 80
MN502 Overview of Network Security Page 4 of 4
Prepared by: Dr Wanod Kumar Moderated by: Dr Javed Baloch November, 2018
Example Marking Rubric for Assignment #: Total Marks 80
Grade
Mark
HD
80% +
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
<50%
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction
/10
A very detailed
and very clear
discussion
A well written and
clear discussion .
Generally good
discussion .
Very brief
discussion and
missing report
outline
Poor
Introduction with
irrelevant details
Potential
Security
threats
/12
A very clear and
in-depth
discussion about
three potential
threats
Very clear
discussion about
three potential
threats
Generally good
discussion about
three potential
threats
Brief discussion
about the potential
threats
Poor discussion
about potential
threats with
irrelevant
information
Working
Mechanism
/08
A very detailed
and very clear
working
mechanism of
the lightweight
cryptography
Very clear working
mechanism of the
lightweight
cryptography
Generally good
discussion about
working
mechanism of the
lightweight
cryptography
Brief discussion
about working
mechanism of the
lightweight
cryptography
Poor discussion
with irrelevant
information
Performance
Metrics
/10
An in-depth and
very clear
discussion about
the
performance
metrics
Very clear
discussion about
the performance
metrics
Generally good
discussion about
the performance
metrics
Brief discussion
about the
performance metrics
Irrelevant
discussion about
the performance
metrics
Algorithms
/10
Excellent
discussion about
two lightweight
cryptographic
algorithms
Very good
discussion about
two lightweight
cryptographic
algorithms
Good discussion
about two
lightweight
cryptographic
algorithms
Brief discussion
about two
lightweight
cryptographic
algorithms
Unsatisfactory
discussion
Challenges
/10
A very clear and
in-depth
discussion
Very clear
discussion
Generally good
discussion
Brief discussion
Poor discussion
with irrelevant
information
Conclusion
/5
A section very
clearly
concludes the
overall
contribution.
A section clearly
concludes the
overall
contribution.
Generally good
conclusion of the
report
Brief conclusion of
the report with some
relevance
Conclusion not
relating to the
report
References
/5
Clear styles with
excellent source
of references.
Clear referencing/
style
Generally good
referencing/style
Unclear
referencing/style
Lacks consistency
with many errors.
Viva voce
/10
Answered all the
questions
appropriately
and accurately
Answered all the
questions with
some clarity
Answered all the
questions with
little in-depth
knowledge
Answered about
50% of the
questions.
Answers were
irrelevant

Tags: thesis writing service uk, thesis writing service online, professional thesis writing service, custom essay writing services, cheap custom essay writing service, best thesis writing services

Why choose Homework Ace Tutors

You Want Quality and That’s What We Deliver

Top Academic Writers

We’ve put together our writing team with care, choosing talented writers who shine in their fields. Each one goes through a tough selection process, where we look for folks with deep expertise in specific subjects and a solid history of academic writing. They bring their own mix of know-how and flair to the table, making sure our content hits the mark—packed with info, easy to read, and perfect for college students like you.

College Prices

We don’t do AI-written essays or copycat work—everything’s original. Competitive pricing is a big deal for us; we keep costs fair while delivering top-notch quality. Our writers are some of the best out there, and we charge rates that stack up well against other services. This means you get stellar content without draining your wallet. Our pricing is straightforward and honest, built to give you real value for your money. That’s why students turn to us for high-quality writing services that won’t break the bank.

100% Plagiarism-Free

Academic integrity is at the heart of what we do. Every paper starts from scratch, with original research and writing tailored just for you. We write 100% authentic—no plagiarism research essays. Our strict quality control process includes scanning every draft with top tools like SafeAssign and Turnitin, so you get a similarity score and proof of originality. We’re obsessive about proper citation and referencing too, crediting every source to keep things legit. It’s all about giving you peace of mind with content that meets the highest standards.

How it works

When you decide to place an order with Dissertation Writer, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went and the marking criteria grade you scored. You can leave a review recommending a writer for your class and course mates.