This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)
Firstranker's choice
Code: 9D08206a
--- Content provided by FirstRanker.com ---
Max. Marks: 60
Time: 3 hours
M.Tech II Semester Supplementary Examinations January/February 2017
WIRELESS NETWORK SECURITY
(Computer Networks)
--- Content provided by FirstRanker.com ---
Answer any FIVE questions
All questions carry equal marks
- (a) What are the main vulnerabilities of wireless networks?
(b) What is the main weakness of the WEP protocol? - Discuss about the trends and security challenges in wireless networks.
- (a) Explain the various attacks on the naming and addressing.
(b) Design a trust mechanism to overcome black hole attack in ad hoc network. - Explain with example, the ARAN and SEED protocol. Compare its pros and cons.
- Discuss about the matrices for security analysis. Explain the need for more rigorous analysis technique for ad hoc wireless network.
- Discuss about any two solutions for privacy protection for low cost RFID tags and crypto enabled RFID tags.
- (a) Discuss on the mechanism to detect the selfish behavior of hot spots.
(b) Explain the operating principle of IEEE 802.11 - (a) What are all the possible game theoretical strategies as a response to the observed traffic?
(b) Explain the corollary “Every node playing AIID is a Nash equilibrium” with required theorem and proof.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)
--- Content provided by FirstRanker.com ---