FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA M.Tech 2nd Sem 2017 Feb 9D08206a Wireless Network Security Question Paper

Download JNTUA (JNTU Anantapur) M.Tech ( Master of Technology) 2nd Semester 2017 Feb 9D08206a Wireless Network Security Previous Question Paper || Download M.Tech 2nd Sem 9D08206a Wireless Network Security Question Paper || JNTU Anantapur M.Tech Previous Question Paper

This post was last modified on 31 July 2020

This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)


Firstranker's choice

Code: 9D08206a

FirstRanker.com

--- Content provided by FirstRanker.com ---

Max. Marks: 60

Time: 3 hours

M.Tech II Semester Supplementary Examinations January/February 2017

WIRELESS NETWORK SECURITY

(Computer Networks)

--- Content provided by FirstRanker.com ---

Answer any FIVE questions

All questions carry equal marks


  1. (a) What are the main vulnerabilities of wireless networks?
    (b) What is the main weakness of the WEP protocol?
  2. Discuss about the trends and security challenges in wireless networks.
  3. --- Content provided by FirstRanker.com ---

  4. (a) Explain the various attacks on the naming and addressing.
    (b) Design a trust mechanism to overcome black hole attack in ad hoc network.
  5. Explain with example, the ARAN and SEED protocol. Compare its pros and cons.
  6. Discuss about the matrices for security analysis. Explain the need for more rigorous analysis technique for ad hoc wireless network.
  7. Discuss about any two solutions for privacy protection for low cost RFID tags and crypto enabled RFID tags.
  8. --- Content provided by FirstRanker.com ---

  9. (a) Discuss on the mechanism to detect the selfish behavior of hot spots.
    (b) Explain the operating principle of IEEE 802.11
  10. (a) What are all the possible game theoretical strategies as a response to the observed traffic?
    (b) Explain the corollary “Every node playing AIID is a Nash equilibrium” with required theorem and proof.

FirstRanker.com

--- Content provided by FirstRanker.com ---



This download link is referred from the post: JNTUA M.Tech 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)

--- Content provided by FirstRanker.com ---