Verfügbare Forschungsthemen für Projekte, Bachelor- und Masterarbeiten
We have demonstrated a secure pairing mechanism based on fingerprints from ambient audio. In case studies, it was observed, that the parameters of the approach need to be adapted in order to provide a good tradeoff between security and usability in environments with varying characteristics such as background noise figure. In this project, the students will derive a mechanism to automatically adapt the parameters of the audio-based ad-hoc secure pairing mechanism.  http://ieeexplore.ieee.org /xpls/abs_all.jsp?arnumber=6112755 Further information: https://wiki.net.informatik.uni-goettingen.de/wiki/Environment-adaptive_adjustment_of_audio-based_security_on_mobile_phones
Beschreibung - Implementierung, Durchführung und Verifizierung von Integrationsbenchmarks für die in Mikelangelo entwickelten Komponenten in OpenStack - Auswahl und Bewertung verschiedener Methoden für die Leistungsanalyse einzelner Komponenten - Auswahl und Bewertung verschiedener Methoden und Tools für die Leistungsanalyse von OpenStack - Design / Durchführung und Vergleich von Benchmarks - Analyse bestehender Leistungsschwächen und Handlungsvorschläge Persönlicher Benefit, Wissenserwerb - Einblick in OpenStack und damit einem beliebten Open Source Cloud Computing Framework - Umgang mit verteilter Serverarchitektur - Lernen wie man ein System beurteilt Benötigte Fähigkeiten - Programmierkenntnisse - Statistik, Datenauswertung Umfang - 3-6 Monate (auch in mehrere Arbeiten unterteilbar, wenn verschiedene Methoden oder OpenStack Komponenten in den Fokus gesetzt werden) Art von Arbeit - Bachelor - stud. Projekt - Masterarbeit http://www.gwdg.de/index.php?id=3083&L=0
Development and Comparison of Test Suite Generation Heuristics
ROP, BT, MT
There is a variety of model-driven test suite generation approaches in research and practice. In addition to the model structure and the model inference, strategies for the generation of test suites from the models are a central topic. The aim is to derive an efficient test suite from a model that can be executed against the system under test (SUT), ideally in an automated manner. The topic of this thesis is mainly the usage-based test suite generation, i.e., the generation a test suite that tests highly used parts intensively and seldom used parts sparsely. The foundation for the test suite generation is a usage profile of the SUT. Various strategies already exist, e.g., randomized test suite generation with random walks, as well as a greedy heuristic. In this thesis, additional test suite generation strategies should be defined, implemented and compared to the existing ones. The new strategies will be based on well-known heuristics, e.g., genetic programming.
Models for Event-driven Software with the Eclipse Modeling Framework (EMF)
Event-driven software is a large part of today’s software market, e.g., through Web services and end-user GUI applications. As part of our research, we develop the tool platform AutoQUEST (http://autoquest.informatik.uni-goettingen.de/) tool for the quality assurance of event-driven software, e.g., usage-based testing and usability analysis. The underlying models are all build around an abstract event Application Programming Interface (API). The objective of this thesis is the integration of the AutoQUEST’s abstract event API with the EMF, as well as conversion between EMF models and the models implemented on top of AutoQUEST. This will facilitate the conversion between AutoQUEST’s models and EMF model, from which AutoQUEST will greatly benefit as the powerful modeling and visualization tooling that already exists become available.
Beschreibung: - Aufsetzen, verifizieren und trimmen einer Big Data Plattform. Integration mit Sahara. - Hadoop, Spark, was auch immer wir brauchen. - Alles anständig dokumentieren. - Vielleicht für den wissenschaftlichen Teil Messungen durchführen. Die Installation auf Performanz trimmen. Persönlicher Benefit, Wissenserwerb - Wichtiger Skill für administrative Tätigkeiten - Big data ist momentan sehr von Bedeutung und Datenverwaltung wird zunehmend wichtiger Benötigte Fähigkeiten - Unix Administration - Statistik, Datenauswertung Umfang - Ca. 3-6 Monate. Art von Arbeit - Bachelorarbeit (Rein Aufsetzen, verifizieren und etwas Performanz testen) - stud. Projekt (Aufsetzen und verifizieren) - Masterarbeit (Aufsetzen, verifizieren, Performanz testen, auf Performanz trimmen http://www.gwdg.de/index.php?id=3083&L=0
Recognition of activities on mobile phones is typically conditioned on inertial sensors such as accelerometers. However, the phone is, although in the same room as its owner about 90 percent of the time, within arms reach only about 50% of a day (cf. ,). Consequently, inertial sensors can not be utilised for activity recognition most of the time since the phone is discarded. However, we have recently demonstrated the recognition of activities and gestures based on RSSI captured on a mobile phone. With RSSI information, the perception of a phone can be extended to its environments. In this project, the student(s) will optimise and implement activity recognition from RSSI fluctuation on a mobile phone. There are various questions to be solved in this topic. The exact task will therefore be defined in cooperation with the student and depend on the type of thesis/project conducted. We will provide the hardware required and preliminary implementations which can be used as a starting point. For further information, please refer to https://wiki.net.informatik.uni-goettingen.de/wiki/Activity_recognition_from_RSSI_on_android_mobile_phones
In traditional wireless communication systems, communication load is limited for its large impact on energy resources of nodes. However, for passive, such as, RFID, backscatter or parasitic nodes, which constitute a significant share of devices in the upcoming Internet of Things (IoT), the main constraint will be computational load rather than energy. In this project, students will develop and deploy a network of distributed nodes that compute functions on the wireless channel. USRP Software Defined Radio nodes will be provided to serve as network nodes in this project.  http://dx.doi.org/10.1109/IOT.2012.6402311 Further information: https://wiki.net.informatik.uni-goettingen.de/wiki/Utilising_convolutions_of_random_functions_for_calculations_on_the_RF-channel
Test suite analysis through fault seeding
In order to promote techniques for the generation of test suites, it is vital to compare the results with other techniques. The most important criterion is the number of faults a test suite finds, i.e., how effective a test suite is. However, this is a difficult task, because it is seldom possible to evaluate this criterion with respect to “real” faults in software. Hence, tools that facilitate the comparison are required. Fault seeding is a popular approach to deal with this problem. The principle behind fault seeding is to inject a certain amount of faults into a software artifact. Then, test suites can be compared based on the number of injected faults they find. The rational is that there should be a correlation behind the finding of artificial and real faults. Hence, the more artificial faults are found, the more real faults would be found, and the better the test suite. The topic is of this thesis is the implementation of fault seeding methods. The implemented fault seeding methods should be compared to one another (e.g., the types of faults that are seeded). Furthermore, the required software and/or manuals for fault seeding needs to be provided.
Beschreibung - Aufbau eines Continuous Integration Workflows für das fortlaufende Testen der in Mikelangelo entwickelten Komponenten. - Konzeptionelle Beschreibung des Continuous Integration Workflows - Deployment der CI Infrastruktur - Deployment der CI Monitoring Struktur - Dokumentation der Infrastruktur und Mitarbeit am Aufbau ggf. auch der Durchführung des CI Workshops - Masterarbeit: Erhöhung der Softwarequalität in Opensource Projekten durch einen Continuous Integration-Prozess Persönlicher Benefit, Wissenserwerb - Einblick in den Workflow von CI und Open Source Projekten; besondere Komplexität in Mikelangelos Anwendungsfall. - Skills für die Systemadministration und Codemanagement Benötigte Fähigkeiten - Unix Administration - Programmieren Umfang - 3-6 Monate Art von Arbeit - Bachelorarbeit - stud. Projekt - Masterarbeit http://www.gwdg.de/index.php?id=3083&L=0
We have multiple topics in this area. Please refer to our thesis page for a more detailed list and feel free to contact one of us. https://wiki.net.informatik.uni-goettingen.de/wiki/Theses_and_Projects Contact: email@example.com firstname.lastname@example.org
Beschreibung - Hadoop in OSv zum Laufen bringen. - Unklar ob das so direkt möglich ist. - Falls möglich, mit Cloudius Systems gemeinsam Hadoop zum Laufen zu bringen. - Falls nicht möglich, so viel erreichen wie es geht: Probleme dokumentieren, Lösungspfade erstellen und den Aufwand dokumentieren. Persönlicher Benefit, Wissenserwerb - Arbeit an brandneuem Betriebssystem (OSv). - Enge Kollaboration mit Cloudius System, den Entwicklern von OSv. - Hadoop/Big Data in OSv ist gerade Pionierarbeit und könnte in Zukunft ein Grundpfeiler von Big Data sein. Benötigte Fähigkeiten - Programmieren - Unix Administration Umfang - 3 Monate Art von Arbeit - studentische Arbeit, da nicht klar ist ob sich die Integration realisieren lässt. Bei einem Projekt reicht, es Probleme zu identifizieren, den Aufwand einzuschätzen und Lösungsszenarien aufzuzeigen. Bei einer Masterarbeit wäre ein positives Ergebnis wünschenswert. http://www.gwdg.de/index.php?id=3083&L=0
Approaches borrowed from nature have brought many appropriate solutions in the domain of communications. Biological systems can be helpful in designing self-organizing and self-healing networks. In this work different bio-inspired approaches in networking and security, with the emphasis on wireless communication, where features such as scalability and adaptability to the changes in the environment are important, will be investigated. The work could cover topics for a research project and Master thesis.
We have multiple topics in this category. Please feel free to contact us and/or take a look at the following web-page for a more detailed list of topics. https://wiki.net.informatik.uni-goettingen.de/wiki/Theses_and_Projects Contact: email@example.com firstname.lastname@example.org
In recent years, with tremendous advances in areas like mobile devices, algorithms for distributed systems, communication technology or protocols, all basic technological pieces to realise a Smart City are at hand. Missing, however, is a mechanism that bridges these pieces to ease the creation of Smart Cities at a larger scale. In our previous work, an opportunistic sensing platform has been proposed as an enabling technology for smart cities. In this project, students will develop such opportunistic social sensing platform.  http://link.springer.com/chapter/10.1007%2F978-3-662-43984-5_31  http://dl.acm.org/citation.cfm?id=2633674 Further information available at: https://wiki.net.informatik.uni-goettingen.de/wiki/Opportunistic_social_sensing_as_an_enabling_technology_for_smart_cities
Indoor positioning still remains a challenging task since GPS does not work indoors and reliable. Furthermore, ubiquitously deployed alternatives are not available. Recenty, localisation techniques based on radio frequency measurements have been proposed. In this project, the student(s) will design and implement an indoor localisation system based on RF-signal strength fluctuation. We will provide USRP software defined radio devices and further required hardware equipment to design an accurate RF-based indoor localisation system. In the frame of the 2014 IPSN Indoor Localisation Competition  the designed system can be tested under realistic conditions. A participation is highly appreciated and will be supported. For further information, please refer to https://wiki.net.informatik.uni-goettingen.de/wiki/Indoor_localisation_based_on_RF-signal-strength
Beschreibung - Recherche von Benchmarks für Big Data - Aufsetzen und Einsetzen eines Benchmarks auf mehreren Plattformen (Docker, KVM, sKVM) - Probeweise mit OSv - Messen von Ergebnissen - Analyse der sub-benchmarks, die I/O-bound sind. Persönlicher Benefit, Wissenserwerb - Arbeit mit und Analyse von Big Data Plattformen. - wissenschaftliche Arbeit mit möglicher Publikation. - Kollaboration mit Intel. Benötigte Fähigkeiten - Unix Administration - Statistik, Datenauswertung Umfang - 2-6 Monate - 2 Monate, um einen Benchmark auf einer einzigen Plattform zum Laufen zu bringen und zu dokumentieren. - 6 Monate für alle drei Plattformen. - Mehr als 6 Monate für alle drei Plattformen plus genaueren Analysen und Verbesserungsvorschlägen. Identifikation von I/O bound workloads. Art von Arbeit - Studentisches Projekt. Für jede Plattform. - Masterarbeit. - Beides für das volle Programm. Erst Aufsetzen auf 1-2 Plattformen. Dann auf den Übrigen plus Analysen. http://www.gwdg.de/index.php?id=3083&L=0
The aim of this Master thesis is to implement an agent-based trust model using Qualnet. The trust dissemination model is applied for providing self-organized authentication mechanism for mobile ad-hoc networks using Ant Colony Systems.
Having a shared medium and mobility always posed security threats in the wireless networks. There are many different countermeasures exist in theory for different attacks in the wireless networks; however, simulating these attacks can be very helpful for improving these security countermeasures in these environments. In this work "black hole" and "packet flooding" attacks from network layer will be simulated within Matlab. Black hole attacks is a situation that a malicious node drop any packet that it receives from other nodes. In packet flooding attack the malicious node broadcast a large amount of packets into the network for some periods.
An established approach to hide user privacy is to change the user’s tag’s ID every time it is queried. This holds true even when it is queried by a non-authorized reader. But in the existing solutions it leads in the end to the desynchronization problem between current tag’s ID and IDs from the database of the valid reader. The aim of this project is to achieve forward- and backward-untraceability of RFID authentication protocol by applying public-key cryptography.
Development and preparation of programing and robotics exercises for the XLAB Informatik-Camp
Study programmes: Physics, Computer science, Applied Mathematics Level: preferably Master of Education Prerequisites: Average to good programming skills in C++/Python Summary: The goal of this Master project is to develop and prepare programing/robotics exercises for a 1-day XLAB Informatics-Camp workshop. In this 1-day workshop on the 8th of December 2017 about 20 participants will learn the basics of robot programming by demonstration (PbD) which will be exemplified on imitation learning of a human handwriting. PbD is a technique for teaching a robot to perform actions by demonstrating a task by a human to a robot and transferring that knowledge to the robot instead of programming actions through machine commands. The 1-day workshop will consists of two parts: 1) Lectures and programming tutorial, and 2) Practice on robot programming (4 hours of programming practice). Participants of the workshop will work in groups. Programming is based on pre-existing modules for vision and robotic control. Initially all programs will run on a robot simulation. Participants will in the end present their results to the other groups by giving a short talk. Then they will be able to execute and test their results on a KUKA light-weight robot-arm. The task for this Master project is to develop the didactics and the exercises for this 1-day course. The Master student will have to perform exemplary programming of this exercise, write up an implementation protocol suited for the future participants of the XLAB Camp, test the didactics with a few students from computer science, and evaluate and adapt the didactics according to the test results. All this is based on pre-existing modules for image processing and robot control libraries (no programming “from scratch” required!), which can be used as the basis for all practical robot programming exercises. Contacts: Dr. Tomas Kulvicius, Inst. Physics 3, email@example.com Prof. Florentin Wörgötter, Inst. Physics 3, firstname.lastname@example.org
Due to the properties of MANETs, ensure security during wireless communication in such environment is challenging. There are many existing security threats in the network layer and especially in the routing protocols. This thesis focuses on investigating one of the well-known attacks, Sybil attacks, in routing protocols for MANETs. The main aim is to implement Sybil attack models and to investigate the harmful effects made by them. The student should firstly study the Sybil attack and understand how it generally works in the network layer. After figuring out the main variants of Sybil attacks, the student should implement the routing protocol independent Sybil attack models with C++ in OMNeT++ and launch the attacks in routing protocols, for example in AODV, to evaluate the influence made by the Sybil nodes.
Mobile learning is gaining a lot of interest in recent years mainly for its convenience and boundless way of learning. Mobile devices have been recognized as having the potential to facilitate teaching and learning strategies that exploit individual learners’ context. This has led to an increased interest on context-aware adaptive and personalized mobile learning systems aiming to provide learning experiences delivered via mobile devices and tailored to learner’s personal characteristics and situation. In this project, the aim is to develop a simple mobile learning application that can provide learning activities based on the learner’s preference to learning as context.
This project will result in implementation and evaluation of some ideas to provide MANET routing protocols with some privacy properties. The implementation is done in Qualnet. It will fulfill the requirements for a project work for a Master student.
TLS (Transport Layer Security) is an end-to-end security protocol. It establish a secure session between node A (client) and node B (server). Node A initiates the negotiation (Handshake) by sending s clienthello message to B conveying the cryptographic options. B replies with the supported cryptographic option and a certificate containing B's public key. A generates a premaster secret and encrypts it using B's public key and B decrypts it using its private key. A and B use the premaster secret to generate a session key SK (master secret) that will be used to deduce several keys (key block) for encrypting and key-hashing application data. In this project, we propose extending TLS to establish secure sessions between several sensors. The proposed extension will allow all the nodes to share the same session key.
Coming soon ..
MAC layer protocols normally presume that nodes follow the multiple access scheme and are hence vulnerable to DoS attacks in case of presence of misbehaving nodes. The purpose of this Project/Master Thesis is to investigate the possible MAC-layer DoS attacks and their impact on the network throughput using OMNeT++. Finally, based on the obtained results, solutions might be suggested and investigated.
In today’s world of network security, attacks such as Dos and so on continue to evolve although the detection techniques have already been improved. It is not easy, however, to distinguish such new attacks using only knowledge of pre-existing attacks. In this work, we concentrate on machine learning techniques for detecting attacks from network anomalies, with the emphasis on vehicle or mobile ad hoc wireless communication. The work could cover topics for a research project and Thesis. (Programming skills are required for this work)
Anonymous voting administered by a trusted authority
Electronic voting is a challenging cryptographic problem, especially if voter privacy should be ensured. The first aim of the projects/thesis is to elaborate a framework for a centralised electronic voting system with maximum voter privacy. As a special challenge we assume that the system is only used by a small number of known voters. The second aim of the projects/thesis is to develop and test a implementation of the framework.
The purpose of this thesis is to investigate more efficient and secure medium access schemes for wireless networks. We will mainly target establishing a distributed scheduling-based medium access scheme. The efficiency of this scheme will be then manifested by extensive simulations using the OMNeT++ network simulator.
This work is about investigating and simulating a bio-inspired routing mechanism based on ant-colony optimization for mobile ad-hoc networks. The simulation environment used for this thesis is OMNeT++ Discrete Event Simulator. The work aims at comparing the performance of the implemented protocol with some standard routing protocol for ad hoc networks such as AODV.
This master thesis is focused on research and development of a Wireless Mesh Capacity analysis tool, based on nominal capacity calculations, implemented in java.
In this project, different physical layer attacks (such as jamming, DoS, etc.) in RFID will be explored. The existing solutions will be analyzed from the privacy point of view. As a result, the privacy-preserving protocol against a physical layer attack will be presented.
In this thesis some ideas on design of one anonymous multicast routing protocol for mobile ad hoc networks will be implemented and evaluated. Actually some ideas from unicast anonymous routing protocols will be extended to multicast. The implementation should be done in Qualnet. This work fulfills the requirements for a Master thesis.
Malicious nodes in the wireless network usually behave differently as the normal nodes, thus correctly cluster the nodes based on observed data could greatly help the participants in the network to defend against the potential attacks. In this project the student must first investigate the different clustering algorithms (mostly unsupervised clustering algorithm) and give a short overview of the cluster analysis. After having a general understanding of the cluster analysis, the student should focus on the agglomerative hierarchical clustering and implement the core functions with C++. Later the prepared code will be used in a common network simulator for detecting the abnormal nodes in the network.
Random bits are necessary for various cryptographic operations, such as generating keys or nonces. Once some initial seed entropy is provided, it becomes possible to use a DRBG (deterministic random bit generator), such as CTR_DRBG, but the seed entropy needs to be of high quality to guarantee the security of any cryptographic schemes built on top of it. The scope of this project is to investigate existing solutions for gathering entropy on AVR-based sensor nodes (e.g. the Entropy library for Arduino), porting the most promising for use with TinyOS and evaluating the quality of entropy generated, using e.g. the criteria from NIST SP800-90B.
This project analyses how big a wireless mesh network can become and finds usefull scenarios, but general limitations. The results are subject to IFIP conference, WCITD 2010 proceedings.
In this work the application of Artificial Immune System (AIS) for misbehavior detection in Ad-hoc networks is investigated; and a model for it will be presented.
An outlier is an observation which deviates from other observations. In this work some outlier detection techniques including data-mining methods will be explained. As Data set a web of trust of a wireless network is considered; which demonstrate the level of confidence between nodes in the network. A data-mining method is applied to categorize the nodes whose confidence values deviate from the other members trust values.
Malicious nodes in the wireless network usually bring strong harmful effects to the network, thus a mechanism which could help the participants in the network to defend against the potential attacks is desired. In this project, we focus on the security threats in network layer and especially on threats in the routing protocols. There are many proposed routing protocols which could protect the network for some special attacks. In this project, a Bio-inspired security mechanism is given. The student need to investigate the idea of the given scheme first. After having a general understanding of protocol, the student should implement the routing protocol with C++ in OMNET++. Later the student needs to run simulations in order to evaluate the performance of the given protocol.
This work presents components of a general trust a reputation system in Wireless Sensor Networks: a) gather information, b) outlier detection, c) trust and reputation calculation and d) trust and reputation updating. It explains some methods of these four components in a generic trust and reputation system
Recommender systems play an imported role in Technology enhanced learning (TEL). By identifying suitable resources from a potentially overwhelming variety of choices, such systems offer a promising approach to facilitate both learning and teaching tasks. As learning is taking place in extremely diverse and rich environments, the incorporation of contextual information in the recommendation process does matter and it is important to take this information into account when providing recommendations. Such contextualization is researched as a paradigm for building intelligent systems that can better predict and anticipate the needs of users, and act more efficiently in response to their behavior. This project therefore seeks to apply context aware technology and recommendation algorithms to develop a TEL recommender system that will recommend learning activities in a specific learning contexts of the learner.
The work is about the simulation and analysis of a common security threat in wireless ad hoc networks, called Black hole attack. First the different executions of this attack on different routing protocols are explained. Then, it is simulated on DSR routing protocol with different simulation setups. As the simulation had to be run on different scenarios, a web-based graphical user interface is implemented for input parameters and simulation setups. Consequently the results and their corresponding discussions are presented. There are numerous works deal with this attack; however, this work presents analysis about the impact of the number of attackers on the network performance.
This project will be an extension of PECALE (a Personalized and Engaging Context-Aware Learning Environment). PECALE is a system designed with the aim of enhancing personalization and learner engagement through context awareness. PECALE attempts to apply context-aware recommendation approach to recommend learning activities based on the learners contextual information. Currently, learner’s learning preferences in particular sociological preference has been considered as context in recommending learning activities and collaborative partners. However the study intends to expand contextual domain in particular device and location contextual information. This project will particularly focus on incorporating location-awareness functionality in recommending learning activities based on the learner’s location.
Malicious nodes in the wireless network usually bring strong harmful effects to the network. In this project, we focus on the security threats in network layer and especially on threats in the routing protocols. There are many well-known attacks in network layer. In this project, the student needs to investigate the different attack models in this scope and give a short overview of them. After having a general understanding of these attack models, the student should implement the attack models (around 1 to 2 kinds of attacks) with C++ in OMNET++. Before starting to implement the attack model, it’s suggested to investigate the NETA first, which is a framework for the simulation of communication networks attacks. Later the student needs to run simulations in order to evaluate the the effect made by attacks with common routing protocols, such as AODV, DSR.
In this thesis network layer attacks in WSNs should be explored and classified. Afterwards, these attacks should be implemented in the simulation environment OMNeT++ using the Mixim framework.
The aim of this thesis is to design a reference model for effective reputation information systems using Unified Modeling Language (UML). The model tries to address personal and organizational reputation. It includes the concepts of soft trust (recommendation of customers) and hard trust (certificate from a trusted party). Then the work discusses about possible reasons that cause differences for these two kind of trust for an on-line shop.
This master thesis focuses on the implementation and practical testing of an improved localization algorithm for Wireless Sensor Networks (WSNs). The algorithm to implement is based on a particle filter and has already been evaluated by simulation. However, since simulation cannot represent the real environment in every detail a practical evaluation needs to be conducted. Prerequisites: Successfull passing of the "Sensorlab" or equal qualification
This thesis focus on implementing a bio-inspired secure routing protocol in MANETs, which is called fuzzy-based Ant Colony Optimization (ACO) routing protocol. The main idea is to apply ACO algorithm as basic routing protocol structure, meanwhile it applies fuzzy logic to ensure security and efficiency in the network. The student should investigate the idea of the Ant Colony Optimization (ACO) based scheme and fuzzy logic first. After having a general understanding of the approach, the student should implement the proposed routing protocol with C++ in OMNET++ and evaluate the performance of the proposed scheme.
Die Übertragung von Textnachrichten in Echtzeit zwischen zwei oder mehr Teilnehmern, ist bereits seit den Anfängen von Computernetzwerken bekannt. Mit dem Aufkommen des Internet erlebte diese Kommunikationsart unter dem Namen "Instant Messaging" (IM) in den neunziger Jahren einen rasanten Anstiegt. Die Nutzer setzten hierbei meist proprietäre Systeme wie z.B. ICQ, MSN, AIM etc. ein, welche jeweils geschlossene Systeme bilden. Durch den Ausbau der Mobilfunknetze für die Datenübertragung sowie die Verbreitung Smartphones wird IM heute häufig als Alternative zum vergleichsweise teueren verschicken von SMS genutzt. Hierbei kommen weiterhin eher proprietäre Protokolle wie Skype, WhatsApp etc. zum Einsatz, welche als Insellösungen an einzelne Anbieter gebunden sind. Die genutzten IM Lösungen sind häufig nicht sicher, an einen Anbieter gebunden und proprietär, d.h. nur über die offiziellen Clients nutzbar. Des Weiteren ist häufig die Einrichtung von zusätzlichen Accounts notwendig, da die Clients unabhängig vom Mobiltelefon sind. Seit 2000, gibt es das "Extensible Messaging and Presence Protocol" (XMPP), einen offenen auf XML basierten Kommunikationsstandard, der im Gegensatz zu den proprietären Protokollalternativen einen offenen dezentralen Ansatz verwendet. Seit 2002 wurde das Kernprotokoll von der Internet Engineering Task Force (IETF) in mehreren RFCs spezifiziert. XMPP soll als Ausgangspunkt verwendet werden, um einen Prototyp für einen sicheren mobilen IM-Client zu entwickeln. Geeignete Sicherheitsprotokolle müssen hierfür ausgewählt werden, welche eine Ende-zu-Ende-Verschlüsselung zwischen den Teilnehmern ermöglicht sowie auch eine sichere authentifizierte Kommunikation zwischen den Clients und beteiligten Servern. Darüber hinaus soll eine Verbindung zwischen Telefonnummern und IM-Nutzerkonten hergestellt werden, so dass der IM-Dienst ohne das manuelle Anlegen zusätzlicher Accounts genutzt werden kann. Die Privatsphäre der Nutzer muss dabei geschützt werden, so dass keine Rückschlüsse von Accounts auf Telefonnummern gezogen werden können.
Die Sendereichweitebestimmung des Netzwerksimulators Qualnet ermöglicht es den theoretischen Empfangs- und Sende-Radius einer drahtlosen Netzwerkkomponente vorherzusagen. In diesem Projekt soll durch Debugging des Quellcodes herausgefunden werden, von welchen Parametern genau die Sendereichweite abhängt und wie entsprechender Einfluss darauf ausgeübt werden kann.
This project explores the WSNs structure and TinyOS system especially based on the sensor node (Iris) used in the lab of Telematics Group, University of Goettingen and illustrates the important characteristics of TinyOS. Furthermore it discusses the sensor sensing challenge by using the related sensor board. In general Wireless Sensor Networks (WSNs) are designed to monitor physical or environmental conditions through the cooperative working of a large number of distributed autonomous sensors . Due to the diversity of applications of WSNs, TinyOS which is an open source operating system started by University of California, Berkeley in 1999 intended for WSNs is becoming even more popular involving thousands of academic and commercial developers and users worldwide.
The purpose of this internship is to implement a MAC layer misbehavior attack in a wireless device. The MadWiFi driver will be used and modified to allow the corresponding device to get a bigger share of the channel. Consequently, the effect of such a modification will be tested in a simple wireless network.
In this thesis, a new mobility model featuring geographic restriction by ESRI Shapefile data is implemented for the QualNet network simulator. An overview over QualNet, network simulation in general and existing mobility models is given. The model’s practical implementation is thoroughly described and its resulting characteristics examined.
This research project work is an analysis of data gathered from a network simulator in order to identity-attack detection (Sybil attack) in wireless ad-hoc networks. Sybil attack happens when an entity in the network pretends to have different identities which leads to severe threats in the network. As there is no priori value to label nodes as honest or Sybil attacker, the gathered data from QualNet feed to a code in Matlab to find the decision point for discrimination between cluster of honest node and cluster of Sybil node. Considering different scenarios and topologies, in this project the cutoff-point is calculated to classified trusted nodes and Sybil nodes.
In order to provide secure inter-vehicle communication, this project investigates the secure beaconing in vehicular networks using digital signature and certificates. The performance of some secure protocols will be evaluated considering computing and communicating overhead. Simulation tools SUMO and OMNET++ are used for this aim.