WhatsApp
✍️ Get Writing Help

ASK A QUESTION

LD7008 Wireless Networks and Security LD7008 Assessment 1 Brief Module Code LD7008 Module Title Wireless Networks and Security Statement of task Assessment A1 This assessment invites you to address the following task:

LD7008 Wireless Networks and Security

LD7008 Assessment 1 Brief

Module Code

LD7008

Module Title

Wireless Networks and Security

Statement of task

Assessment A1

This assessment invites you to address the following task:

1. Critical appraisal of the global nature of WLAN standards and design
2. To gain critical understanding of the core concepts in wireless and mobile communication technologies, modelling of wireless channel, security threats and vulnerabilities associated with wireless networks.
3. Critically analyse security protocols associated with wireless local area networks (WLANs) as well as apply specialist knowledge to design and evaluate a secure wireless network.
4. Critically evaluate and apply suitable security measures to protect wireless networks against known vulnerabilities.
5. Demonstrate ability to work in culturally diverse groups and teams and make appropriate and personal contributions to team effectiveness

Word Limit

The total word limit for this assessment paper should have no more than 2000 plus the 10% which is allowed to add.

Weighting

This assessment is worth 50 %_A1

Submission Time and Date

The deadline is 16/01/2026 no later than 16:00 GMT

Submission of Assessment

This assessment should be submitted electronically, online via Turnitin. You will find a Turnitin link to submit your assessment on the module eLP Blackboard site.  It is your responsibility to ensure that your assessment is submitted by the submission deadline stated. Penalties apply for late submissions

Provision of feedback

Written feedback will be provided on 06/02/2026

This assignment consists of one component.

A1 – 2000 words submitted plus 10% apart of the tables and references.

Instructions on Assessment:

You are required to investigate the vulnerabilities and weaknesses of one of the topics below. You are expected to research the technical details of the vulnerability, how it can be done, the impact of this vulnerability and the risks it poses on the networks and the businesses. You are also expected to identify methods that are used or proposed to prevent attacks and mitigate those risks.

Topics

1. Eavesdropping in Bluetooth networks.
2. IoT Malicious node- Routing attacks.
3. IoT firmware hijacking attacks
4. IoT confidentiality attacks
5. Wireless LAN rogue access point
6. Crack wireless vulnerability in WPA2
7. Brak tooth vulnerability in Bluetooth devices.
8. NFC relay attack vulnerability.
9. Students can choose a different attack if it is agreed by lecturer – You are required to contact me if choosing your own topic.

Instructions

  • You are required to use the template available in assessment page (IEEE template)
  • You are expected to use research papers and reference them in your document.

Word count

You should not exceed 5 pages using the template with the same font size. This is roughly around 2000 words.

Mapping to Programme Goals and Objectives

Learning Outcomes tested in this assessment:

The following Learning outcomes will be addressed in this assignment:

  • LO2. Be able to describe, explain critically and assess wireless and mobile data communication technologies deployed along with associated security issues.
  • LO3. Critically analyse 802.11 protocol information and demonstrate skills in designing secure wireless networks
  • LO4. Apply suitable security measures to protect wireless networks against known weaknesses

Module Specific Assessment Criteria and Rubric

Requirements Maxmark
Abstract (max 100 words (discuss scenario)) 5
Introduction 10
Literature review on the topic. 15
Technical background on the vulnerability -How the vulnerability can be exploited. 15
Risk assessment of the impact of the chosen vulnerability/ies on theuser/network 15
Recommend or suggest which of those solutions is the most suitable and justify your opinion 25
Conclusion and further studies 10
References  5

ASSESSMENT REGULATIONS

You are advised to read the guidance for students regarding assessment policies. They are available online here.

Academic Misconduct

The Assessment Regulations for Taught Awards (ARTA) contain the Regulations and procedures applying to cheating, plagiarism, the use of Artificial Intelligence (AI) Systems, and other forms of academic misconduct.

The full policy is available here

You are reminded that plagiarism, collusion, the use of Artificial Intelligence (AI) Systems, and other forms of academic misconduct, as referred to in the Academic Misconduct procedure of the assessment regulations, are taken very seriously. Assignments in which evidence of plagiarism or other forms of academic misconduct is found may receive a mark of zero.

Late submission of work 

Where coursework is submitted without approval, after the published hand-in deadline, the following penalties will apply. For coursework submitted up to 1 working day (24 hours) after the published hand-in deadline without approval, 10% of the total marks available for the assessment (i.e.100%) shall be deducted from the assessment mark.

For clarity: a late piece of work that would have scored 65%, 55% or 45% had it been handed in on time will be awarded 55%, 45% or 35% respectively as 10% of the total available marks will have been deducted.

The Penalty does not apply to Pass/Fail Modules, i.e. there will be no penalty for late submission if assessments on Pass/Fail are submitted up to 1 working day (24 hours) after the published hand-in deadline.

Coursework submitted more than 1 day (24 hours) after the published hand-in deadline without approval will be marked as zero but will be eligible for referral. The reassessment should where appropriate, and as determined by the Module Leader, be the same method (e.g. essay) but maybe with a different task (e.g. different essay title) or with the same task (e.g. the same essay title) as indicated in the Module handbook. 

In modules where there is more than one assessment component, Students are not required to complete all assessment components if an overall Pass Mark (40% UG, 50% PGT) has been achieved. 

The only permitted exception will be in cases where the University is prevented from doing so by a PSRB requirement. In the case of PSRB requirements, a variation order will be required from the regulations. 

In modules, where there is more than one assessment component and an overall pass mark has not been achieved, Students will be eligible for a referral* in the individual failed module and/or not attempted component(s) of assessment.

These provisions apply to all assessments, including those assessed on a Pass/Fail basis.

Word limits

The word count is to be declared on the front page of your assignment and the assignment cover sheet.  The word count does not include:

The word limits count will not include the tables, appendices, glossary, footnotes, and references.

Please note, in text citations [e.g. (Smith, 2011)] and direct secondary quotations [e.g. “dib-dab nonsense analysis” (Smith, 2011 p.123)] are INCLUDED in the word count.

If this word count is falsified, students are reminded that under ARTA this will be regarded as academic misconduct.

For those assessments where students are required to keep to the word limit, it is proposed that they should be informed that the marker will stop reading at the point when they judge that the word limit exceeds the recommended word count by more than 10%.  The marker will indicate the point at which they stop reading on the text.  

Students must retain an electronic copy of this assignment (including ALL appendices) and it must be made available within 24hours of them requesting it be submitted.

Module Specific Assessment Criteria and Rubric

Assessment criteria

Completely insufficient

Insufficient

Satisfactory

Good

Very Good

Excellent

 

0-39%

40-49%

50-59%

60-69%

70-79%

80-100%

Abstract & Int

No efforts have made to expose the research aspect

No efforts have made to expose the research aspect

normal efforts which do not show the whole picture of the development

Good efforts made to brief abstract

Very good understanding about the progress made in the development of the paper topic

Excellent brief about the progress made in the development of the paper topic

Lit Review

Insufficient details about the current and previous work have been presented

Insufficient efforts and attempt about the current and previous work have been presented

Satisfactory efforts made to explain the core subject domain with less example and research acumen

Good explanation of the core subject with good view of the problem domain

Very good  explanation of the current and previous attempts and authors work towards the topic and knowledge domain

Excellent and deep explanation of the current and previous attempts and authors work towards the topic and knowledge domain

Technical Bg

 

No efforts have been done at all

No sufficient attempt and efforts have been done so far

Adequate details have been presented about the security technical background and more in depth details are missing

Good efforts has been placed to explain the technical background about the problem domain

Very Good efforts has been placed to explain the technical background about the problem domain

Excellent details and deep understanding about the security issues and problem domain has been presented, in addition to the technical issues, design and architecture aspects has been discussed

RiskAssess

 

insufficient efforts made to highlight the impact on the functional aspects

No sufficient efforts and attempt made to highlight the impact on the functional aspects

Adequate explanation has been made to highlight the important impact on the operation

Good explanation has been made to highlight the important impact on the operation

Very Good efforts have been made to analyse the expected risks and its impact on the security operations

Excellent efforts and deep understanding have been done to highlight the vital stages of the Risk assessment and very good explanation has been made to avoid any unexpected events against the suggested model/design

Recommendation

No Sufficient  recommendations have been suggested which misses the new aspects and features of the proposed theory/idea

Insufficient recommendations and attempts have been suggested which misses the new aspects and features of the proposed theory/idea

Adequate recommendations have been suggested which misses the new aspects and features of the proposed theory/idea

Good efforts and a developing design has been recommended to overcome the traditional aspects of the current vulnerabilities

Very good effort has been made to suggest and recommend a developed design with new aspects to solve the current vulnerability

Excellent efforts has been done to highlight the vital stages of the Risk assessment and very good explanation has been made to avoid any unexpected events against the suggested model/design

Conclusion

No sufficient conclusions and pragmatic ideas have been presented to develop the solution

No sufficient conclusions and realistic ideas have been presented to develop the solution

fair conclusions and some random practical ideas have been presented to develop the current solution

Good conclusions and some random practical ideas have been presented to develop the current solution

Very good conclusions and deep understanding with good idea have been presented to develop further the suggested design or model

Clear conclusions and brilliant Idea has been suggested to develop the solution in the future with very good functionalities…etc.

References

No ref has been used at all

No sufficient references have been inserted for such an important subject

Adequate references have been inserted for such an important subject

Good and  sufficient references have been inserted for such an important subject

Very good references have been inserted

Excellent references have been used and very good in text citation has been inserted

Assessment Guidance Session

Detailed assessment guidance will be given in Week 3 Seminar/lecture.  The Seminar/lecture will provide advice on 

1. Overview of the module learning objectives and align them with a good study plan 
2. How to understand the requirements of the given Wireless security issues.
3. How to conduct/ research further reading about wireless security vulnerabilities
4. how the assessment will be graded against the rubric
5. How to submit the reports( both A1 &A2) and using NU IT system and not miss the deadline.   

You are reminded that recorded assessment guidance will be provided on the eLP Blackboard site for this module after Week 3 Seminar. 

Use of Generative AI within this Assessment

In alignment with Northumbria University’s Academic Regulations for Taught Awards (ARTA), section 1.2, you are reminded that “In all assessed work students should take care to ensure that the work presented is their own and that it fully acknowledges the work and opinions of others”.
Unless the assessment specific guidance above requests that you use generative AI in crafting your assessment, AI should not be used to do the core work for you.  You should assume that generative AI may be used as follows:

  • AI can help with things like improving grammar, helping with structure format, organising ideas, and generating suggestions.
  • The main content, analysis, and conclusions in your work must always be your own work

Further guidance regarding using AI responsibly and ethically can be found in your student portal here.

When you submit your assessment, you will be requested to add and sign a declaration of your use of AI in the creation of your work.  A copy of this declaration document is attached to the end of this document.  You should place this signed copy at the front of your submission.  Failure to accurately record your use of such tools may be considered as academic misconduct.

Academic Regulations

As part of the preparation for writing your assessment, you should familiarise yourself with the following policies, all of which can be found here:

  • Academic Regulations for Taught Awards (ARTA)
  • Academic Misconduct
  • Word Limit
  • Late Submission of Work
  • Short Extensions
  • Personal Extenuating Circumstances (PEC)
  • Technical Extenuating Circumstances (TEC)

Please see the module Blackboard site/eLP for further details of how the University Assessment Regulations may affect/support you

LD7008 Wireless Networks and Security LD7008 Assessment 1 Brief Module Code LD7008 Module Title Wireless Networks and Security Statement of task Assessment A1 This assessment invites you to address the following task:
Scroll to top