Secure Mobile Networking Lab Exercise / Project Winter 2010 Kick-off meeting Prof. Dr.-Ing. Matthias Hollick Technische Universität Darmstadt Secure Mobile.

Slides:



Advertisements
Similar presentations
NetPay provides best and effective solution for company Managers to maintain their employee scheduling task (including staff in/out details, overtime,
Advertisements

Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
1 THE OFFICE 2 OFFICE PROJECT COLLABORATION SYSTEM.
Project Supervisor: Prof Bill Tucker Project Co-Supervisor: Mr. MJ. Norman Project Advisor: Mr. Carlos Rey- Moreno Ajayi Olabode Oluwaseun Department of.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
E-commerce Project Erik Zeitler Erik Zeitler2 Lab 2  Will be anounced and scheduled later  We will deploy Java Server Pages on a Tomcat server.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Leveraging IP for Sensor Network Deployment Simon Duquennoy, Niklas Wirstrom, Nicolas Tsiftes, Adam Dunkels Swedish Institute of Computer Science Presenter.
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
Generic Sensor Platform for Networked Sensors Haywood Ho.
CS 441: Charles Durran Kelly.  What are Wireless Sensor Networks?  WSN Challenges  What is a Smartphone Sensor Network?  Why use such a network? 
Secure Video Streaming Proxy Server A Proof of Concept Prototype Bora Güngören Portakal Teknoloji
Wireless Sensor Network Security Anuj Nagar CS 590.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
SoNDa Sensor Network for Data Explore! 1. SoNDa Sensor Network for Data Explore! KEYWORDS Wireless Sensors Communication 2.
“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
© 2012 IBM Corporation IBM Israel Software Lab (ILSL( Daniel Yellin, Director March 2013.
Wireless Sensor Networks CS 4501 Professor Jack Stankovic Department of Computer Science Fall 2010.
Computer Network Fundamentals CNT4007C
ANSALDO: BACKGROUND experience in dependable Signalling Automation Systems experience in dependable Management Automation Systems experience in installation,
COEN 252 Computer Forensics
FMEA-technique of Web Services Analysis and Dependability Ensuring Anatoliy Gorbenko Vyacheslav Kharchenko Olga Tarasyuk National Aerospace University.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) Joint Workshop and 4 th Plenary Meeting Bologna June 13, 2014.
Capita Selecta Distributed Systems Danny Hughes, Wouter Joosen, Sam Michiels, Eddy Truyen IBBT-DistriNet, KULeuven September
COLUMBIA UNIVERSITY Department of Electrical Engineering The Fu Foundation School of Engineering and Applied Science IN THE CITY OF NEW YORK Networking.
Description of the monitoring system experimentation on the freight car pSHIELD Demonstrator Testbed Architecture pSHIELD Final Review Meeting, Bruxelles.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
KAIST CS710 컴퓨터구조 특강 무선 센서네트워크 응용 및 보안 Syllabus Network & Security Lab.
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
June 2004 SIW-4 - IP in Space Implementation Guide 1 Handbook for Using IP Protocols for Space Missions James Rash - NASA/GSFC Keith Hogie, Ed Criscuolo,
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
Work in Progress for Wireless Sensor Networks Yonghe Liu Dept. of Computer Science and Engineering The University of Texas at Arlington.
WP4 deliverable Critical Infrastructure Protection: Attack Prevention Solutions and Attacks.
CSE 534: Advanced Computer Networks
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
1 of 8Prof. Dr. Dr. h.c. Otto Spaniol Computer Science, Informatik 4 Communication and Distributed Systems 25/10/2015 Distributed Applications and Network.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
© 2008 Cisco Systems, Inc. All rights reserved ICT Presentation Coming soon… The Internet of Things Mathilde Durvy - Corporate.
A. Hangan, L. Vacariu, O. Cret, H. Hedesiu Technical University of Cluj-Napoca A Prototype for the Remote Monitoring of Water Parameters.
STREP Research Project HOBNET (FP7- ICT , ) HOlistic Platform Design for Smart Buildings of the Future InterNET (
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
B. RAMMAMURTHY Connected Vehicle Technology 6/6/2014 cse651 1.
Future Internet Research Activities in Korea Chong-kwon Kim Seoul National University.
Course Introduction David Ferry, Chris Gill Department of Computer Science and Engineering Washington University, St. Louis MO 1E81.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Computer Networks CNT5106C
Cyberinfrastructure Overview of Demos Townsville, AU 28 – 31 March 2006 CREON/GLEON.
Internet of Things. Creating Our Future Together.
Security of the Internet of Things: perspectives and challenges
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
Snip2Code: Search, Share and Collect Code Snippets Faster, Easier, Efficiently with Power of Microsoft Azure Platform MICROSOFT AZURE ISV PROFILE: SNIP2CODE.
Grid Wide IoT Gateway Supports open standards and technologies, with open interfaces that provide support for proprietary gas-meter reading protocols and.
KNOWLEDGE MANAGEMENT (KM) Session # 32
Improving searches through community clustering of information
Algorithms for Big Data Delivery over the Internet of Things
TRUST:Team for Research in Ubiquitous Secure Technologies
CSCD 433/533 Advanced Computer Networks
Dev Test on Windows Azure Solution in a Box
TNK-115 Using the Internet of Things for secure Urban solutions in a Smart CitY VANGELIS ANGELAKIS ITN - Linköping University.
EEL 6935 Wireless Ad Hoc Networks
The Contiki Operating System Allan Blanchard, INRIA
Presentation transcript:

Secure Mobile Networking Lab Exercise / Project Winter 2010 Kick-off meeting Prof. Dr.-Ing. Matthias Hollick Technische Universität Darmstadt Secure Mobile Networking Lab - SEEMOO Department of Computer Science Center for Advanced Security Research Darmstadt - CASED Mornewegstr. 32 D Darmstadt, Germany Tel , Fax or Prof. Dr.-Ing. Matthias Hollick

2 SEEMOO welcomes you to our joint kick-off for lab exercise (Praktikum)/project (Projektpraktikum) Welcome Oct | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick [1] Source: Cell Phone Sculptures from

3 Lab Exercise (“Praktikum”)  Goal:  Practice to work on a complex/challenging problem  Learn about efficient and rational group work  Focus on practical implementations  Improve hands-on technique and experience  But also improve theoretical knowledge  Ideally in small groups of 2-3 students  Expected work per week per student: 4 hours  You will earn 6CP Overview Oct | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

4 Project (“Projektpraktikum”)  Goal:  Work as a team towards the realization of a joint “product”  Students are responsible for project planning and management  Tasks shall be jointly addressed and planned methodically, the distribution of tasks is performed in the project team  Practice to work on a complex/challenging problem  Learn about efficient and rational group work  Additional tasks on top of a lab exercise: project planning and management need to be documented  Expected work per week per student: 6 hours  You will earn 9CP Overview Oct | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

5 Schedule and deadlines  , 16:30 Kick-off meeting (Room S4/ )  , 23:59 Confirmation of topic with advisor  , 13:30 Design workshop (Room S4/ )  , 13:30 Final presentation (Room S4/ )  Code review with advisors  , 23:59 Submit project report (~6 pages ACM/IEEE format) Organizational Issues Oct | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

6 Participatory Sensing  Protecting your Privacy within Online Social Networks (Topic DC1) Wireless Sensor Networks  Fast Routing Across Wireless Sensor Networks (Topic DY1) Security  Catch me if you can: Intrusion Detection System for WSN (Topic MR1) Optional Topics  Sensing the World: From Collection to Visualization (Topic DC2)  Even Wireless Sensor Nodes talk IP (Topic DY2)  Know your enemy: Security Testing Tool for Contiki OS (Topic MR2) Topics Oct | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

7 Protecting your Privacy within Online Social Networks (Topic DC1) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick Simplify the settings to guarantee privacy  Members of OSN share contents e.g. the pictures of their last parties on Facebook  They may not modify or update their default privacy settings because it is cumbersome  People may therefore access their private data and discover that their owners e.g. may not only drink water during parties Your Task: Design and implement a privacy-enhanced application controlling the access to pictures based on content and social relationships including:  Access control mechanisms  Interfaces  Integration into an online social network Group task: Group of up to 3 students Contact: Dipl.-Ing. Delphine Christin

8 Fast Routing Across Wireless Sensor Networks (Topic DY1) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick Realtime guarantees still lacking in WSN  End-to-end delay is hard to guarantee  But important for many app, such as automation  SPEED achieves soft realtime communication Your Task:  Implement SPEED in contiki  Evaluate SPEED and compare it with AODV and CTP (Collection Tree Protocol)  Report your ideas and experience Group task: Group of up to 3 students Contact: M. -Sc. Dingwen Yuan

9 Catch me if you can: Intrusion Detection System for WSN (Topic MR1) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick Prevention is not everything  Crypto could be broken  Insider attacks  Novel attacks  … Your Task:  Get an overview of IDS architectures  Design your IDS and implement it  Evaluate the IDS Group task: Group of up to 3 students Contact: Dipl. Wirtsch.-Inf. Michael Riecker

10 Sensing the World: From Collection to Visualization (Topic DC2) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick Benefit from sensor data from sensor platforms and mobile phones  Sensor nodes can easily be deployed in infrastructures to capture environmental parameters  Mobile phones and their embedded sensors are:  Deployed at large scale  Charged by the users  Their mobility pattern follow the streams of the population  The combination of both worlds offers innovative applications Your Task: Design and implement a hydride architecture to collect, store and visualize sensor data including:  Functions to collect data  Storage management  Visualization tools Group task: Group of up to 3 students Contact: Dipl.-Ing. Delphine Christin

11 Even Wireless Sensor Nodes talk IP (Topic DY2) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick IPv6 on wireless sensor nodes  IPv6 provides solution to “Internet of Things”  Sensor nodes are very resource constrained TelosB: 8 MHz mcu with 48kB program flash, 10kB RAM  IPv6 stack implemented in contiki OS Small footprint: Code size 11.5kB, RAM usage 1.8kB  Time synchronization is a must for WSN apps Your Task:  Implement the system clock on contiki nodes  Implement NTP protocol on contiki IPv6  Implement other time sync protocols for WSN and evaluate (extra)  Report your ideas and experience Group task: Group of up to 2 students, more students with extra task Contact: M. -Sc. Dingwen Yuan

12 Know your enemy: Security Testing Tool for Contiki OS (Topic MR2) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick WSNs may have many vulnerabilities  Unattended nature  Limited power  Wireless medium  … Your Task:  Get an overview of existing attacks  Implement your Security Testing Tool  Evaluate the tool Group task: Group of up to 3 students Contact: Dipl. Wirtsch.-Inf. Michael Riecker