View
218
Download
2
Tags:
Embed Size (px)
Citation preview
Secure Mobile NetworkingLab Exercise / Project
Winter 2010Kick-off meeting
Prof. Dr.-Ing. Matthias Hollick
Technische Universität Darmstadt Secure Mobile Networking Lab - SEEMOO
Department of Computer ScienceCenter for Advanced Security Research Darmstadt - CASED
Mornewegstr. 32 D-64293 Darmstadt, Germany
Tel.+49 6151 16-70922, Fax. +49 6151 16-70921http://seemoo.de or http://www.seemoo.tu-darmstadt.de
Prof. Dr.-Ing. Matthias Hollick [email protected]
2
SEEMOO welcomes you to our joint kick-off forlab exercise (Praktikum)/project (Projektpraktikum)
Welcome
Oct. 2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
[1] Source: Cell Phone Sculptures from http://homepage.mac.com/joester5/art/index.html
3
Lab Exercise (“Praktikum”) Goal:
Practice to work on a complex/challenging problem Learn about efficient and rational group work
Focus on practical implementations Improve hands-on technique and experience But also improve theoretical knowledge Ideally in small groups of 2-3 students Expected work per week per student: 4 hours You will earn 6CP
Overview
Oct. 2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
4
Project (“Projektpraktikum”) Goal:
Work as a team towards the realization of a joint “product” Students are responsible for project planning and management Tasks shall be jointly addressed and planned methodically, the
distribution of tasks is performed in the project team Practice to work on a complex/challenging problem Learn about efficient and rational group work
Additional tasks on top of a lab exercise: project planning and management need to be documented
Expected work per week per student: 6 hours You will earn 9CP
Overview
Oct. 2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
5
Schedule and deadlines 26.10.2010, 16:30 Kick-off meeting (Room S4/14 5.3.01) 29.10.2010, 23:59 Confirmation of topic with advisor 07.12.2010, 13:30 Design workshop (Room S4/14 4.2.02.1) 08.02.2011, 13:30 Final presentation (Room S4/14 4.2.02.1) 25.02.2011 Code review with advisors 27.02.2011, 23:59 Submit project report (~6 pages ACM/IEEE format)
Organizational Issues
Oct. 2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
6
Participatory Sensing Protecting your Privacy within Online Social Networks (Topic DC1)
Wireless Sensor Networks Fast Routing Across Wireless Sensor Networks (Topic DY1)
Security Catch me if you can: Intrusion Detection System for WSN (Topic MR1)
Optional Topics Sensing the World: From Collection to Visualization (Topic DC2) Even Wireless Sensor Nodes talk IP (Topic DY2) Know your enemy: Security Testing Tool for Contiki OS (Topic MR2)
Topics
Oct. 2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
7
Protecting your Privacy within Online Social Networks (Topic DC1)
21-04-2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
Simplify the settings to guarantee privacy
Members of OSN share contents e.g. the pictures of their last parties on Facebook They may not modify or update their default privacy settings because it is cumbersome People may therefore access their private data and discover that their owners e.g. may not only drink water during parties
Your Task:
Design and implement a privacy-enhanced application controlling the access to pictures based on content and social relationships including:
Access control mechanisms
Interfaces
Integration into an online social network
Group task: Group of up to 3 students
Contact:Dipl.-Ing. Delphine [email protected]
8
Fast Routing Across Wireless Sensor Networks (Topic DY1)
21-04-2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
Realtime guarantees still lacking in WSN End-to-end delay is hard to guarantee But important for many app, such as automation SPEED achieves soft realtime communication
Your Task: Implement SPEED in contiki Evaluate SPEED and compare it with AODV and CTP (Collection Tree Protocol) Report your ideas and experience
Group task: Group of up to 3 students
Contact:M. -Sc. Dingwen [email protected]
9
Catch me if you can: Intrusion Detection System for WSN (Topic MR1)
26-10-2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
Prevention is not everything Crypto could be broken Insider attacks Novel attacks …
Your Task: Get an overview of IDS architectures Design your IDS and implement it Evaluate the IDS
Group task: Group of up to 3 students
Contact:Dipl. Wirtsch.-Inf. Michael [email protected]
10
Sensing the World: From Collection to Visualization (Topic DC2)
21-04-2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
Benefit from sensor data from sensor platforms and mobile phones
Sensor nodes can easily be deployed in infrastructures to capture environmental parameters Mobile phones and their embedded sensors are:
Deployed at large scale Charged by the usersTheir mobility pattern follow the streams of the population
The combination of both worlds offers innovative applications
Your Task:
Design and implement a hydride architecture to collect, store and visualize sensor data including:
Functions to collect data
Storage management
Visualization tools
Group task: Group of up to 3 students
Contact:Dipl.-Ing. Delphine [email protected]
11
Even Wireless Sensor Nodes talk IP (Topic DY2)
21-04-2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
IPv6 on wireless sensor nodes IPv6 provides solution to “Internet of Things” Sensor nodes are very resource constrained
TelosB: 8 MHz mcu with 48kB program flash, 10kB RAM
IPv6 stack implemented in contiki OS
Small footprint: Code size 11.5kB, RAM usage 1.8kB
Time synchronization is a must for WSN apps
Your Task: Implement the system clock on contiki nodes Implement NTP protocol on contiki IPv6 Implement other time sync protocols for WSN and evaluate (extra) Report your ideas and experience
Group task: Group of up to 2 students, more students with extra task
Contact:M. -Sc. Dingwen [email protected]
12
Know your enemy: Security Testing Tool for Contiki OS (Topic MR2)
26-10-2010 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
WSNs may have many vulnerabilities Unattended nature Limited power Wireless medium …
Your Task: Get an overview of existing attacks Implement your Security Testing Tool Evaluate the tool
Group task: Group of up to 3 students
Contact:Dipl. Wirtsch.-Inf. Michael [email protected]