This is the doctor comment on my paper: Overall, you’ve done a great job with th

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

This is the doctor comment on my paper:
Overall, you’ve done a great job with th

This is the doctor comment on my paper:
Overall, you’ve done a great job with this assignment. I was hoping to see a more in-depth expansion of each of the sections you have. Your paper is missing the reference pages. I like your Cryptographic Methods and Algorithms and proposed architecture, I thought it was excellent.
——————————
The paper instructions are the following:
Introduction
In this project, your student group will specify and design cryptographic services to protect a sensor network. Groups will turn in a single group report and group presentation of their work.
The Situation:
The WPPL (World Panda Protection League) monitors the location of pandas in a number of very large forest preserves in China. Throughout each of these forests, the WPPL has deployed several hundred sensors that can detect the location of nearby pandas. When a panda is detected, the sensor relays the location information across the sensor network to a collection server at the edge of the forest. The panda information is stored here for real-time tracking and behavioral analysis.
Unfortunately, rangers are few and unable to adequately protect the preserves. More unfortunately, there are panda hunters in the forests! The hunters are dangerous; even the rangers want to avoid them.
The sensor network works well at relaying panda locations, perhaps too well. As it turns out the crafty panda hunters have started exploiting the sensor network to find the pandas. Using a radio device near where the collection server is, the hunters intercept the incoming messages and determine the location of the pandas. The hunters realized that the messages were readable and informed them where a panda could be found.
Your company has been hired to protect the pandas.
A bit about the sensors —
The sensors are solar-powered, have limited battery, and are resource constrained.
Because of weather and angry pandas not all sensors may be operating.
The sensors are low-power with limited transmission capability — they can only transmit to nearby sensors.
The transmission uses much more power than reception.
If too few sensors are active, messages can not be relayed through to the collection server.
The sensor network must run unattended for long periods of time.
It is possible for you to add an ARM-based software module to the sensor between the sensor output and its radio transceiver.
Because the hunters have free range through the forest, it may be possible for them to gain physical access to sensors. They can’t modify the sensors but they may be able to access their internal storage. Recently, a ranger found a hunter camp. In it was radio equipment, a notebook computer, and a stash of reading material including dozens of well-read books on cryptography.
Update:
Your employer has learned that another security company was brought in to provide a similar solution for a different forest. Details are limited, but as it turned out, even when communications were encrypted between sensors, the hunters were able to exploit the network to find the pandas. How? How would you protect against this? This may be crucial for your solution.
Instructions
Paper:
For this segment of your service, address the following in a paper of approximately 1,000 – 2,000 words and cite a minimum of 3 references in APA 7th style:
Propose a broad-ranging encryption-based security solution to protect the pandas.
Examine the threats from the hunters you would need to protect against.
Develop a set of questions you should ask your employer before beginning. (Direct these to your instructor)
Propose your solution including any diagrams needed to clearly convey what you propose.
Explain what cryptographic methods/algorithms you would use.
Explain why they were chosen. Be specific, be detailed, and provide an analysis to back up your decisions.
Describe these sufficiently so that the customer can understand why they were selected.
Discuss any special challenges you feel this project may encounter. Your solution should be sufficiently detailed to support a project plan for its implementation.
Regarding the Updated information:
Explain how you would protect against the hunter’s exploitation of the network to find pandas.
As an addendum, feel free to contribute any other solutions you feel may help the WPPL protect the pandas.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now