X

MCSCB105–1 Mobile Network Security M.Tech Model Question Paper : mgu.ac.in

Name of the College : Mahatma Gandhi University
Department : Computer Science and Engineering
Subject Code/Name : MCSCB 105 – 1/MOBILE NETWORK SECURITY
Sem : I
Website : mgu.ac.in
Document Type : Model Question Paper

Download Model/Sample Question Paper :
I : https://www.pdfquestion.in/uploads/mgu.ac.in/5033-1-MCSCB%20105-1%20MNS%20-%20I.doc
II : https://www.pdfquestion.in/uploads/mgu.ac.in/5033-2-MCSCB%20105-2%20CNS%20-%20II.doc

MGU Mobile Network Security Question Paper

M.Tech DEGREE EXAMINATION :
Branch: Computer Science and Engineering
Specialization : Cyber Security

Related : MGU MCSCB104 Cryptographic Protocols & Standards M.Tech Model Question Paper : www.pdfquestion.in/5032.html

Model Question Paper – I
First Semester :
MCSCB 105 – 1 MOBILE NETWORK SECURITY
(Regular – 2013 Admissions)
Time : Three Hours
Maximum : 100 marks
Answer all questions. :
1. a) Explain about third generation wireless systems (8)
b) Write note on Antennas and Wave Propagation. (9)
c) Explain about Spread Spectrum. (8)
OR
2. a) Discuss the different Signal Encoding Techniques. (13)
b) Explain Coding and Error Control in wireless network. (12)

3. a) Explain the operations and standards of wireless system. (13)
b) Explain about wireless LAN technology and standards. (12)
OR
4. a) Explain about Mobile IP and Wireless Access Protocol. (12)
b) Write note on IEEE 802.11 and IEEE 802.15 standards. (13)

5. a) Explain about various wireless privacy challenges. (12)
b) Discuss about DOS and Insertion Attack (13)
OR
6. a) Discuss the different threats to wireless networks. (9)
b) Explain about various client to client hacking methods. (8)

c) Write short note on Rogue Access Point (8)

7. a) Explain about Encryption and Decryption in GSM. (12)
b) Explain about RC4 Encryption. (13)
OR
8. a) Discuss on Access Point-Based Security Measures. (8)
b) Write about WPA/ WPA2 standard. (9)
c) Explain the security implementation in Bluetooth and Wi-Max (8)

M.Tech DEGREE EXAMINATION :

MCSCB 105 – 2

CRYPTOGRAPHY AND NETWORK SECURITY :
(Regular – 2013 Admissions)
Time : Three Hours
Maximum : 100 marks
Answer all questions. :
1. a) Explain public-key encryptions and Hash function. (12)
b) Give note on public-key cryptography and RSA and explain how it works in security aspects. (13)
OR
2. a) Discuss security attacks and security services. (12)
b) Write note on classical encryption techniques. (13)

3. a) What are the different techniques used for e- mail security? Explain it. (13)
b) Explain SSL and transport layer security. (12)
OR
4. a) What is meant by Kerberos? Explain about X.509 Authentication service. (15)
b) Describe about IP security Architecture. (10)

5. a) Discuss the different Techniques for network intrusion detection. (12)
b) Write about password management techniques. (13)
OR
6. a) What are the different malicious software’s? Explain it. (13)
b) Write note on Firewall design principles and trusted systems. (12)

7. Briefly explain the following
a. Techniques for hiding the source or destination of network traffic (13)
b. IPSEC VPNs. (6)
c. HTTP authentication (6)
OR
8. a) Write note on DOS and distributed denial-of-service (DDoS) attacks. (12)
b) Describe the advanced techniques for reacting to network attacks. (13)

Syllabus

Module 1 : Transmission Fundamentals
Antennas and Wave Propagation. Cellular Wireless networks, Third Generation Systems, 4G Long Term Evolutions, Signal Encoding Techniques, Spread Spectrum, Coding and Error Control, Multiple Access in Wireless Systems.

Module 2 :
Satellite Networks, Wireless System Operations and Standards, Wi-Max an Ultra Wide Band technologies, Mobile IP and Wireless Access Protocol. Wireless LAN Technology, Wi-Fi and IEEE 802.11 Wireless LAN Standard, Blue-tooth and IEEE 802.15 standard.

Module 3 :
Threats to Wireless networks, ESM, ECM and ECCM, Proliferation of device and technologies, Practical aspects, Wireless availability, Privacy Challenges, Risks : Denial of Service, Insertion Attacks, Interception and monitoring wireless traffic, MIS configuration, Wireless Attacks, Surveillance, War Driving, Client-to-Client Hacking, Rogue Access Points, Jamming and Denial of Service.

Module 4 :
Authentication, Encryption/Decryption in GSM, Securing the WLAN, WEP Introduction, RC4 Encryption, Data Analysis, IV Collision, Key Extraction, WEP Cracking, WPA/ WPA2, AES, Access Point-Based Security Measures, Third- Party Security Methods, Funk’s Steel-Belted Radius, WLAN Protection Enhancements, Blue-tooth Security Implementation, Security in Wi- MAX, UWB security, Satellite network security.

References :
1 Kaveh Pahlavan and Prashant Krishnamurthy,”Principles of Wireless Networks”, Prentice -Hall, 2006.
2 Cyrus Peikari and Seth Fogie, “Maximum Wireless Security” Sams, 2002.

3 Hideki lmai, Mohammad Ghulam Rahman and Kazukuni Kobari “Wireless Communications Security”, Universal Personal Communications of Artech House, 2006.

4 Stallings William, “Wireless Communications and Networks” Second Edition, Pearson Education Ltd, 2009.
5 Jon Edney and William A. Arbaugh, ” Real 802.11 Security: Wi-Fi Protected Access and 802.11i” , Addison-Wesley Professional, 2003.

Tags: mgu.ac.in
Anusha:
www.pdfquestion.in © 2022 Contact Us   Privacy Policy   Site Map