307 – Mobile

Assignment Instruction: Securing Underwater Acoustic Networks

You are required to complete a comprehensive group project titled:

Securing Underwater Acoustic Networks

This project must be completed in accordance with the requirements of the Mobile & Wireless Communications module. The work consists of two main components:

1. Group Report (3000 words)

2. Individual Reflections (5 students 500 words each)

## Part 1: Group Report (3000 words)

You are expected to prepare a well-structured technical report that includes the following sections:

### 1. Abstract

Write a concise summary of the project (150200 words), including:

– Purpose of the study

– Methods used

– Key findings

### 2. Introduction

Provide a clear introduction covering:

– Definition of Underwater Acoustic Networks (UANs)

– Importance of secure communication underwater

– Applications (military, environmental monitoring, oil & gas)

– Problem statement (security challenges in UANs)

### 3. Literature Review

Conduct a review of recent research papers and include:

– Existing security techniques in underwater networks

– Common threats (eavesdropping, jamming, spoofing, replay attacks)

– Limitations of current approaches

– Identified research gaps

Use proper Harvard referencing style.

### 4. Methodology / System Design

Design and describe a simulation model using MATLAB that includes:

– Underwater nodes (transmitter & receiver)

– Acoustic communication channel

– Noise modeling (ambient noise, interference)

– Attack scenario (e.g., jamming or eavesdropping)

Then implement:

– A basic communication system (without security)

– A secured system (with encryption or authentication)

Clearly explain:

– System block diagram

– Algorithms used

– Simulation assumptions

### 5. Mathematical Modelling

Include relevant equations such as:

– Signal-to-Noise Ratio (SNR)

– Bit Error Rate (BER)

– Channel attenuation models

Explain how these are used in your simulation.

### 6. Results

Present your findings using:

– Graphs (BER vs SNR)

– Tables of results

– Comparison between:

– Without security

– With security

### 7. Discussion

Critically analyze:

– Impact of security techniques on performance

– Trade-offs (security vs delay, power consumption)

– Limitations of your model

– Any errors encountered and how they were solved

### 8. Conclusion

Summarize:

– Key outcomes of the project

– Most effective security approach

– Suggestions for future improvements

### 9. References

– Use Harvard referencing style

– Include all sources used in literature review

## Part 2: MATLAB Simulation

You must:

– Build a working simulation model using MATLAB

– Demonstrate:

– Signal transmission

– Noise effects

– Security implementation

– Generate plots and results

– Record a video demonstration explaining:

– Model design

– Results obtained

## Part 3: Individual Reflection (IMPORTANT)

There are 5 students, and each student must submit an individual reflection of 500 words.

Each reflection must include:

### 1. Personal Contribution

– What tasks you completed in the project

– Your role in the group

### 2. Learning Experience

– What you learned about:

– Underwater networks

– Security techniques

– MATLAB simulation

### 3. Critical Analysis

– Evaluate the project results

– Discuss challenges faced

– Suggest improvements

### 4. Group Work Evaluation

– How the team worked together

– Strengths and weaknesses of collaboration

## Submission Requirements

– Combine all files into a .zip folder

– Include:

– Report (PDF)

– MATLAB files

– Video demonstration

– Ensure:

– No plagiarism

– Clear figures and explanations

– Proper formatting

## Important Notes

– The report must be technical, clear, and well-organized

– All graphs and results must be explained

– Avoid copying or using AI-generated content without understanding

– Ensure each section is complete and logically connected

## Final Goal

The objective of this project is to demonstrate your ability to:

– Understand underwater communication systems

– Identify and analyze security challenges

– Design and simulate a secure communication model

– Critically evaluate system performance

Make sure the work is completed professionally and meets all academic standards.

WRITE MY PAPER


Comments

Leave a Reply