Question: Final Project Spring 2023 There will be one final project during the semester. The purpose of the project task is to deepen and/or broaden the

Final Project Spring 2023

There will be one final project during the semester. The purpose of the project task is to deepen and/or broaden the student knowledge and abilities in wireless networks. It will give graduate students an opportunity to become familiar with research methodologies in computer science. It will be worth 50% of the final course grade. Each student is required to do a project being worth 50% of the final grade by studying a particular topic in depth. The project is done individually. Basic Steps of Project First, you need to identify a specific area you are interested in, and you need to identify a specific problem related to this area, so that you should be able to write down the statement of problem in the introduction part of your final report. Then, you should learn the existing approaches to that problem by doing the literature search. Third, by doing brainstorming on the possible new approaches to that problem, you should come up with a new or modified approach that may or may not be better than the existing approaches. Fourth, do some sort of performance analysis for all the available approaches and your approach using available free/commercial simulators or writing your own simulators or employing analytical techniques; just do your best in this part. Finally, write down your final report, and give a presentation on your project. IEEE Explore: https://purl.missouristate.edu/library/databases/IEEEIET http://citeseer.ist.psu.edu/cs Outlines of a Research Paper it is most efficient to write papers from outlines. An outline is a written plan of the organization of a paper, including the data on which it rests. You should, in fact, think of an outline as a carefully organized and presented set of data, with attendant objectives, hypotheses, and conclusions, rather than an outline of text. It can be relatively efficient in time to go through several (even many) cycles of an outline before beginning to write text; writing many versions of the full text of a paper is slow.

What an outline should contain: 1. Title 2. Authors 3. Abstract Do not write an abstract. That can be done when the paper is complete 4. Introduction The first paragraph or two should be written out completely.

Pay attention to the opening sentence. Ideally, it should state concisely the objective of the work, and indicate why this objective is important

. In general, the introduction should have these elements:

The objectives of the work.

The justification for these objectives: why is the work important?

Background: who else has done what? How? What have we done previously?

Guidance to the reader: what should the reader watch for in the paper? What are the interesting high points? What strategy did we use? 5. Related works The section should synthesize your literature review for the existing methods in the research area. The advantages and disadvantages of the existing methods should be analyzed and illustrated. By clearly describing previous work, you can better describe the current limitations and the need for new methodology. It also gives you an opportunity to demonstrate knowledge of the area and helps others relate your current work to other scientific areas. Remember to include references for any method you discussed. 6. System Model This section illustrates the system model you plan to use in your work. For example, what the network looks like (deployed in circle area or rectangle area, only sink or multiple sinks applied), energy consumption model, and etc. 7. Proposed methodology Clearly illustrates your algorithm to solve a specific problem. Usually authors gives pseudo code representation of your proposed idea. 8. Experiments and analysis This section gives the authors opportunity to prove the performance of proposed new methodology, either from mathematical theoretical analysis, or from simulation experiments. It is important to get all the date in their proper place (Equations, Figures, Tables).the text in this section mainly serves to explain the data. 9. Summary and future works Lists the main contribution of your work, add a new, higher level of analysis, and should indicate explicitly the significance of the work. You also can briefly talk about the future works you plan to do based on your current work. Three Phases of final Project The project will be completed and graded in four phases. These phases are submission of intermediate implementation check, giving a presentation which summarizes your final paper, and submission of final paper. Intermediate implementation of your final project On March 21, Monday, students are required to submit an intermediate report which includes the following items updated introduction section in outlines updated related works in outlines clearly describe the model in your research clearly illustrate your proposed solution or approach describe what kind of theoretical analysis you plan to do, what you have done. Show the simulation of your method and analyze result data, see what problems you have, and state the experimental data is what you expected or not, why?

-------------------------------------- Briefly Read to understand the requirement of the project:- Effective Encryption technique for Wireless Communication

Introduction In the last 10 years, a lot of research has been done on relay-based cooperative wireless networks. Less research on information security when signal passage across the relay nodes or at wireless channel is one drawback of delivering information signals over generally in wireless channels through them and in particular through cooperative networks. Without regard to privacy, an intrusive party can readily recover data and extract signal from the relay or from any place along the transmission channel. Encrypting the data before transmission is one technique to get around this weakness. But using encryption in relay-based cooperative wireless communication has a number of disadvantages. First, because of the extra overhead packets, encryption uses a lot more bandwidth than usual. Second, because of the avalanche effect (described in [1] and [2]), which significantly lowers the effective bandwidth utilization in wireless fading channels, performance suffers significantly. Processing time needed by the encryption and decryption methods at the source and destination sides, respectively, also contributes to the delay. The possible throughput is substantially decreased as a result of all these shortcomings. Furthermore, because of the avalanche effect inherited in conventional encryption algorithms, performance degradation caused by fades in wireless multipath fading channels may, under some extreme circumstances, render it nearly difficult to decode the data at the destination side. The idea of a virtual private network (VPN) is another means to have information transmitted wirelessly in a safe manner. The establishment of a VPN relies on the use of certain encryption techniques, or ciphering, in order to secure the information being transmitted. Depending on the user's preference, a number of encryption algorithms can be applied. Most of these approaches' security claims are predicated on the assertion that no practical method for breaking a cipher was available at the time it was proposed. Proposed Encryption Model The following is a description of the suggested hybrid encryption algorithm's system and information signal paradigm. We suggest in this approach, a novel hybrid encryption algorithm that achieves the same level of security (across the board for the entire encrypted-coded data) as the well-known traditional encryption algorithms while requiring fewer processing cycles (PC), thereby improving the system throughput that can be achieved. The AES cipher method, is the conventional message encryption strategy that will used to encrypt the first block in our model. This algorithm is a well-known standard and is particularly resistant to adversarial attacks by attacker, for example brute force attackers. We will use two encryption methods named as AES and RSA to encode the message. The data is divided into blocks greater the size of AES standard blocks (128) the remaining data in the block is encoded with RSA so the whole AES encryption is reduced. And both encryption techniques provide sustainable security. The initial communication channel is started by RSA then AES and RSA are used to communicate. By these hybrid algorithms, security can be ensured more than previous methods.

References

[1] J. Reason, End-to-End Confidentiality for Continuous-Media Applications in Wireless Systems, Ph.D. dissertation, UC Berkeley, December 2000. [2] M. A. Haleem, C. N. Mathur, R. Chandramouli, and K. P. Subbalakshmi, Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks, IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, pp. 313-324, October-December 2007 [3] Mihaljevic, M. J., & Kohno, R. (2002, March). On wireless communications privacy and security evaluation of encryption techniques. In 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No. 02TH8609) (Vol. 2, pp. 865-868). IEEE. [4] Jadoon, A. K., Wang, L., Li, T., & Zia, M. A. (2018). Lightweight cryptographic techniques for automotive cybersecurity. Wireless Communications and Mobile Computing, 2018. [5] Agoyi, M., & Seral, D. (2010, September). SMS security: an asymmetric encryption approach. In 2010 6th International Conference on Wireless and Mobile Communications (pp. 448-452). IEEE.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!