You are on page 1of 3

Set no. Q. No.

Question Description Allocated to


Q1 Write a short not on Redeployment/Reconfiguration and scalability with example.
1 Q2 What do you mean by Faulty/Dead nodes in a network and how to deal with such nodes to improve the performnace of network?
Q3 Explain authentication mechanism of bluetooth network in detail with example. Edara Raj Kumar
Q1 Write a short not on security protocol configuration and Random deployment with example.
2 Q2 What different types of attacks are possible in bluetooth network? Explain in detail with example. Patel Riddhish
Q3 Explain following Terms with example: Confidentiality, Integrity, Avilability, Non-Repudiation and DDoS. Dineshkumar
Q1 What is Routing? Also Explain Event driven and periodic sensor reading with example.
3 Q2 write a short note on Energy efficiency and Uniform power dissipation in context to sensor network with example.
Q3 Explain following Attack in deatil with example: Traffic Analysis, Man in Middle Attack, Buffer Overflow attack, Replay attack and DoS attack. Avi Hritwik
Q1 "sensors near the base station to run out of energy much sooner than the other nodes in the network" justify the statement with example.
4 Q2 Explain Gsm encryption mechanism and also explain Problems with GSM security in detail.
Q3 Explain Wireless Equivalent Privacy (WEP) Goals in detail with example. Abhishek Soni
"Periodically changing the cluster heads balances the energy consumption more or less evenly among the sensors throughout the network" justify the
Q1 statement with example.
5
Q2 Explain WEP Authentication mechanism with proper diagram and also explain encryption mechanism for the same.
Q3 What are Traditional Security Issues. Explain all in detail with example. Nishant Vashistha
Q1 Explain following concepts: Diffusion Routing, Control Flooding, directional Routing and Cartesian routing with example.
6 Q2 What different attacks are possible on WEP (Wireless Equivalent Privacy)? Explain in detail with example.
Q3 Explain the concept of WEP encryption, WEP Decryption and WEP authentication mechanism in deatil with block diagram. Saurav Vipul
Q1 Write a short note on Directional source aware routing and Trajectory-based forwarding with example.
7 Q2 What do you mean by security association? Alos explain IEEE 802.16 key management scheme in detail.
Q3 Explain all Mobile & Wireless Security Issues in deatil with example. Arihant Jain
Q1 What do you mean by Group Communication? How Higher and Lower level confidence effects performace of the network?
8 Q2 What are different problems occur Ad-Hoc Networks. Explain in detail with example. Bellamkonda Mani
Q3 Write a short note on WEP and WPA in detail with example. Ratna Reddy
Q1 Write a short note on Fault Tolerance and Reliability with example.
9 Q2 Explain the concept of WEP encryption mechanism with block diagram in detail.
Q3 What is the role of cluster head in routing of sensor network. Explain the concept that how to select new cluster head and why? Ankit Singh
Q1 Explain FEC and ARQ approach in Fault tolerance in adhoc network.
10 Q2 GSM security has several shortcomings. Discuss all those shortcomings properly.
Q3 Give brief overview of the various “802.11-something” protocols. Sachin Kadyan
Q1 Discuss event driven and periodic routing in detail with example.
11 Q2 Explain key management, problems and limitations of 802.16 security.
Q3 Explain WEP with diagram. Also discuss the flaws of WEp. Prince Patel
Q1 Differentiate random deployment and redeployment of sensor nodes with example.Also discuss the scalability in adhoc network.
12 Q2 Define three Bluetooth security modes for devices in Wireless Personal Area Network. Also define piconet.
Q3 Discuss GSM authentication and encryption with diagram. Vishal Singh Dhariyal
How location of nodes in network is important for routing? Also explain how we can calculate the estimate location of nodes in efficient way?
Q1
13
Q2 How integrity is important in security discuss with example? Explain WEP encryption with proper diagram.
Q3 How confidentiality, Availability and integrity is import in security? Explain with the help of the examples. Rahul Singhal
Q1 Discuss the routing is wireless sensor network with example. How it is different from routing in other types of network?
14 Q2 Explain the different states of Bluetooth node.
Q3 Explain how Bluetooth encryption and authentication process work? Also Explain master and slave concept. Kanav Sharma
Q1 How we can Deal with dead or faulty nodes in network? Explain with examples.
15 Q2 Discuss the security mechanism of WPAN with all the keys. Discuss Piconet and multipoint in WPAN.
Q3 Discuss group communication and scalability with example. Pooja Kumari Singh
Q1 For the reduction of energy consumption how MAC layer protocol works?
16 Q2 Define the concept of security in wireless personal area network. Also discuss 4 attacks.
Q3 Explain two methods for conducting the periodic reading with examples. Harish Bharti
Q1 Explain periodic sensor readings with examples also explain energy consumption in this.
17 Q2 Explain Bluetooth network items. Also define keys in security mechanism.
Q3 Explain uniform power Dissipation and sensor component power management in energy efficiency with example. Muskan Kumari
Q1 Explain the concept of self-organization in sensor network also write note on Tiny OS.
18 Q2 Explain three modes of Bluetooth encryption with diagram. Also explain the concept of authentication in Bluetooth.
Q3 Explain multi-hop routing also write note on reliability and scalability in network. Nitika Jasrotia
Q1 Why WSN design is challenging in research point of you? Explain in detail.
19 Q2 What are the various tasks of WSN? Explain in detail.
Q3 Explain the problem of GSM security in detail. Yogendra Gupta
Q1 Explain various unique features of sensor network in detail.
20 Q2 Explain Bluetooth security in detail.
Q3 Explain different types of resource constraints in WSN in detail. Samyak Jain
Q1 Explain group communication and synchronization in deatil with suitable example.
21 Q2 Explain energy efficient communication in detail.
Q3 Explain MobileIP in detail. Rahul Sahu
Q1 Explain WEP goals and security in detail.
22 Q2 What are the mobility requirements in WSN? Explain each in detail.
Q3 Define Piconet and multipoint in WPAN. Explain the security mechanism of WPAN with detail description of all the keys. Neeraj
Q1 What is group communication? And why it requires collaboration between nodes?
23 Q2 Explain WEP encryption and decryption in detail.
Q3 What is the need of wireless security and what are the various ways to secure wireless network? Deepam Mishra
Q1 Differentiate between event driven routing and periodic routing.
24 Q2 Explain the approaches of Fault tolerance in ad-hoc network.
Q3 Explain traditional security issues in wireless security. Also explain any 5 types of attacks. Sanyam Karnawat
Q1 Explain in detail what is War Driving, War Walking and War Chalking?
25 Q2 What are the problems of WEP and how WPA fixes it?
Q3 Explain IEEE 802.16 standard in detail. Rahul Shaw
Q1 Explain different states of Bluetooth nodes in detail.
26 Q2 Explain Deployment and configuration approaches in WSN.
Q3 Explain in detail how MAC layer protocol reduces the energy consumption in adhoc networks. Shaik Rashid Basha
Q1 What are the various device security levels? Explain each in detail.
27 Q2 Explain how routing in adhoc network is different from other networks?
Q3 What do you understand by Confidentiality, Integrity, Avilability and Repudiation? Explain each with example. Shubham Handa
Q1 List all types of routing in wireless adhoc network. Explain Event driven and periodic routing in detail.
28 Q2 Explain GSM authentication and Encryption in detail with suiatbale diagram.
Q3 Explain group communication and synchronization. Mukesh Prajapati
Q1 Explain the approaches of Fault tolerance in ad-hoc network.
29 Q2 Explain the problem with GSM security in detail.
Q3 Write short note on TinyOs. Also explain Event driven routing. Arun Kumar Singh
Q1 How MAC layer protocol reduces the energy consumption in adhoc networks.
30 Q2 Explain WEP goals and security in detail.
Q3 Explain following Terms with example: Confidentiality, Integrity, Avilability with example. Rajan Kumar Ranjan
Q1 How to deal with dead or faulty nodes in adhoc netwrok? Also explain multihop routing.
31 Q2 Define Piconet and multipoint in WPAN. Explain the security mechanism of WPAN with detail description of all the keys.
Q3 Explain atleast five wireless security issues in detail with example. Rohit Bhardwaj
Q1 Differentiate between Diffusion and Directional Routing in detail with example.
32 Q2 Explain WEP encryption and decryption in detail.
Auditya Prratapa
32
Q3 Explain energy efficiency approaches and solutions in adhoc netwrok. Auditya Prratapa
Q1 Explain Deployment and configuration approaches and solution in detail.
33 Q2 Explain WEP authentication and attacks with suitable example.
Q3 Explain the method Sensor component power management. Prachi Thapliyal
Q1 How Routing in wireless sensor networks differs from routing in other types of networks? Also explain security in WAN.
34 Q2 Explain traditional security issues in wireless security. Also explain any 5 types of attacks.
Q3 Explain Bluetooth security modes. Sai Prasanna Yenni
"periodically changing the cluster heads balances the energy consumption more or less evenly among the sensors throughout the network" justify the
Q1 statement with example.
35
Q2 Explain the four primary keys used in Bluetooth security in detail.
Q3 Explain Bluetooth node states. Pawan Bhouriyal
Q1 Write a short note on Fault Tolerance and Reliability with example.
36 Q2 Define the term Master and slave in WPAN. Explain Bluetooth encryption and authentication process.
Q3 Explain IEEE802.16 security in detail. Sohanram Jat
Q1 Explain Random deployment and scalability of Wireless Sensors with their need by taking suitable examples for each
37 Q2 What do you understand by Adhoc routing? Discuss various routing protocols by taking proper examples
Q3 Discuss GSM Encryption in detail with proper diagrams and examples. Explain the various services offered by GSM Akansha Nagpal
Q1 “Routing in Wireless sensor networks differ from routing in other types of network”. Explain by taking suitable examples
38 Q2 Discuss how can faulty or dead nodes in Wireless sensor networks be dealt. Take suitable examples and scenarios to explain
Q3 Explain how Encryption works in Bluetooth with its three modes by taking suitable diagrams and scenarios Surman Salman
Q1 Discuss WEP data frame with suitable diagrams, also explain various cons and attacks in WEP by taking suitable examples
39 Q2 Discuss the various techniques proposed for enabling Directional Routing in sensor networks
Q3 Discuss event-driven routing in detail with proper examples. Also discuss the need of routing in a WSN Manisha Basavanna
Discuss wireless security in detail, also discuss security issues of wireless and mobile. Discuss various problems in adhoc networks by taking proper
Q1 examples
40
Q2 Discuss directional source aware routing in Sensor networks. Also, discuss Trajectory-based forwarding in WSN with suitable examples
Q3 What are the various problems with the security of GSM? Discusss in detail Nimangre Yogesh Bhau
Q1 Discuss Periodic sensor readings in detail. Also, discuss the two mechanisms used for conducting Periodic readings in a network
41 Q2 Discuss Bluetooth Authentication with suitable diagrams. Also, discuss various types of attacks on Bluetooth with real- time examples
Q3 Discuss Directional routing in Sensor Networks. Also, discuss why Routing tables and Centralized Routing are not a good option Shivansh Chand Thakur
Q1 Explain Cartesian and directional source aware routing in detail by taking examples for each
Kola Chandu
42 Q2 Discuss security in Wireless Personal Area Network in detail with suitable examples. Also, discuss about the four basic keys used Veerendra Vara
Q3 Explain MAC Layer Protocols in detail by taking proper examples. Also explain TDMA and resource-constrained protocols Brahma
Q1 Explain in detail security in Wireless MAN along with the various problems and limitaions. Take proper examples and diagrams to discuss.
43 Q2 Discuss Fault Tolerance, reliability and energy efficiency in Wireless sensor networks.
Q3 Distinguish between Basic Service Set and Extended Service Set along with their working. Also, discuss goals of WEP Rama Swami Pathak
Q1 Discuss security in Global System for Mobile Communications with suitable examples. Also, discuss cell splitting in GSM
44 Q2 Why do you understand by Self organization of wireless sensors. Also, discuss the security protocol configuration by taking suitable examples
Q3 Discuss security and authentication in wireless equivalent protocol by taking proper diagrams and scenarios Arjun Chaudhary

Q1 Discuss various CDMA identities with suitable example for each. Also, explain five main differences between GSM and CDMA by taking suitable examples
45 Q2 Differentiate between WEP Encryption and Decryption with suitable diagrams and Examples
Differentiate between International Mobile Security Identity and Temporary Mobile Subscriber Identity by taking suitable examples for each. Also,
Q3 Explain the call flow of mobile originated call and mobile terminated call flow in GSM. Rahul Kumar
Differentiate between random and planned deployment of nodes in the network. Justify why random deployment is preferred in case of wireless sensor
Q1 networks.
46
Q2 How MAC layer protocol works For the reduction of energy consumption ? Palavalasa Suresh
Q3 How authentication is important in security discuss with example? Explain WEP encryption with proper diagram. Babu
Q1 Elaborate FEC and ARQ methods for fault tolerance in ad hoc networks. Also highlight the factors for making choice between FEC and ARQ.
47 Q2 Explain the methods required to offer security in Wide area networks in detail along with their probable problems. Ummadisetty Jaya
Q3 What is the need of re-deployment or re-configuration of nodes in wireless sensor networks? Explain in detail. Venkata Sudheer
Q1 Differentiate between Cartesian routing and trajectory based forwarding techniques used in directional routing for WSN.
48 Q2 How confidentaility, integrity and authentication of a network can be maintained and safeguarded for various attacks.
Q3 Discuss secure protocol configuration and group communication in WSN with examples. Ashokraj K
Q1 Discuss the various mechanisms of deployment and configuration in wireless sensor networks.
49 Q2 Elaborate the complete security mechanism used for GSM and also explain the problems associated with GSM security.
Q3 Explain the methods required to offer security in wireless metropolitan area networks in detail along with their probable problems. Dhananjay Kumar

Q1 Elaborate the problems of sending separate messages to base station by a sensor node along with the possible solutions to overcome the problems.
50
Q2 Explain the methods required to offer security in wireless personal area networks in detail along with their probable problems.
Q3 Differentiate between uniform power Dissipation and sensor component power management in energy efficiency with example. Shashi Ranjan Kumar
Determine the situations in WSN, when sensor nodes become dead or faulty. Also discuss the mechanism of dealing with these dead and faulty nodes in
Q1 detail.
51
Q2 Discuss the types of attack on mobile and wireless security by specifying the type of service compromised.
Q3 Explain the methods required to offer security in wireless local area networks in detail along with their probable problems. Utkarsh Kumar
Routing in wireless sensor network differs from other types of network. Justify this statement by explaining the differences and the routing mechanism
Q1 followed by WSN.
52
Q2 Which IEEE standard supports security for local area networks? How Wired Equivalent Privacy method offers comparable security? Explain in detail.
Q3 How scalability and self configuration are related to each other in WSN. Explain in detail with example. Valeti Naveen
Q1 “Routing table is not a good option for WSN”. Justify this statement by further explaining the mechanism used for routing in WSN.
53 Q2 Discuss the security mechanisms opted by WPA. Also find out the disadvantage of using this security method.
Q3 What are the different types of security required in mobile and wireless secuirty. Explain the mechanism of providing security. Mohammad Ashar Khan

Q1 Differentiate between event driven and periodic sensor readings for routing. Also mention the applications that are apt for periodic sensor readings.
54
Q2 Discuss the various security modes of bluetooth along with the attacks possible on bluetooth.
Q3 “Energy Efficiency prolongs the lifetime of WSN”. How energy efficiency of a WSN can be maintained? Himanshu Singh Koshyari
Q1 What type of properties of a sensor network makes it different from adhoc and wireless network.
55 Q2 Explain the concept of Fault tolerance and ARQ.
Q3 Explain the problem with GSM security in detail. Prateek Gupta
Q1 How the sensors near the base station can retain the energy ?
56 Q2 How is it challenging to get advantages of wireless adhoc network
Q3 Explain WEP encryption and decryption in detail. Ram Achal Prajapati
Q1 Discuss the protocol based on taken passing chain based technique for data transmission. Explain with example
57 Q2 How duplicate message supression and comuunication scheduling helps in energy efficient communication. Kaggallu Anjaneya
Q3 How security is enabled in bluetooth network ? Swamy Wari Rohith
Q1 How clustering is beneficial in wireless sensor network. Which protocols use this approach?
58 Q2 what do you understand by Directed diffusion routing protocol and how it is different from other routing protocols ?
Q3 Briefely explain the IEEE 802.11 standard. Karanam Sriram
Q1 How group communication is more energy efficient in sensor based network ?
59 Q2 Explain the method Sensor component power management.
Q3 Define Piconet and multipoint in WPAN. Explain the security mechanism of WPAN with detail description of all the keys. Ankit Guleria
Q1 How is it challenging to get advantages of wireless adhoc network ?
60 Q2 Explain Bluetooth node states.
Q3 Discuss the protocol based onclustering technique for data transmission. Explain with example Sonali Rajhans
Q1 How MAC layer protocols enables the energy efficient communication in sensor network ?
61 Q2 Explain the four primary keys used in Bluetooth security in detail.
Q3 How hidden terminal problem is different from exposed terminal problem , explain with a scenario. Ankit Sharma
Q1 How protocols enables the energy efficient communication in sensor network ?
62 Q2 Explain IEEE802.16 security in detail.
Q3 Explain the concept of dual radio scheduling. Rishindra Mani Katiyar
Q1 Discuss the procedure of PEGASIS , also discuss its cons by using suitable diagrams
63 Q2 Define the term Master and slave in WPAN. Explain Bluetooth encryption and authentication process.
Q3 Define the term Master and slave in WPAN. Explain Bluetooth encryption and authentication process. Avikshit Saras
Q1 Explain about different types of random deployment with examples.
64 Q2 Explain trilateration method for localization in WSNs with example. Sabbasani Revanth
Q3 Explain wormhole attack and any two solutions. Sai Kumar Reddy
Q1 How drones help in random deployment ? Explain with an diagram.
65 Q2 How mobile beacon nodes help in localization?
Q3 Explain sybil attack and any two solutions. Shivam Kumar
Q1 Explain the SEKEN protocol fo WSNs. Use diagrams as necessary.
66 Q2 How RSSI bases localization works? Explain with a diagrams.
Q3 Which kind of security problems can exist in wireless body area networks? Harshit Agrawal
Q1 Explain various parameters that are related for reconfiguration.
67 Q2 Explain DV-hop localization for WSNs.
Q3 What is lightweight security ? How it is important for WPANs? Ritik Kumar Singh
Q1 Explain Triagnulation method in WSNs with example.
68 Q2 Explain APTEEN for WSNs.
Q3 What is zero-knowledge proof? How it is used for authentication in Wireless Body Area Networks? Anshika Singh
Q1 Explain the process of periodic sensor reading in a cold storage architecture. Use diagram.
69 Q2 Explain the process of Energy-Efficient Sensor Routing in WSNs.
Q3 What is perception layer in IoTs? How they are connected with WPAN? Give examples. Abhinabh Parida

You might also like