Secure Mobile Networking Lab Exercise / Project Winter 2010 Kick-off meeting Prof. Dr.-Ing. Matthias Hollick Technische Universität Darmstadt Secure Mobile Networking Lab - SEEMOO Department of Computer Science Center for Advanced Security Research Darmstadt - CASED Mornewegstr. 32 D Darmstadt, Germany Tel , Fax or Prof. Dr.-Ing. Matthias Hollick
2 SEEMOO welcomes you to our joint kick-off for lab exercise (Praktikum)/project (Projektpraktikum) Welcome Oct | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick [1] Source: Cell Phone Sculptures from
3 Lab Exercise (“Praktikum”) Goal: Practice to work on a complex/challenging problem Learn about efficient and rational group work Focus on practical implementations Improve hands-on technique and experience But also improve theoretical knowledge Ideally in small groups of 2-3 students Expected work per week per student: 4 hours You will earn 6CP Overview Oct | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
4 Project (“Projektpraktikum”) Goal: Work as a team towards the realization of a joint “product” Students are responsible for project planning and management Tasks shall be jointly addressed and planned methodically, the distribution of tasks is performed in the project team Practice to work on a complex/challenging problem Learn about efficient and rational group work Additional tasks on top of a lab exercise: project planning and management need to be documented Expected work per week per student: 6 hours You will earn 9CP Overview Oct | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
5 Schedule and deadlines , 16:30 Kick-off meeting (Room S4/ ) , 23:59 Confirmation of topic with advisor , 13:30 Design workshop (Room S4/ ) , 13:30 Final presentation (Room S4/ ) Code review with advisors , 23:59 Submit project report (~6 pages ACM/IEEE format) Organizational Issues Oct | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
6 Participatory Sensing Protecting your Privacy within Online Social Networks (Topic DC1) Wireless Sensor Networks Fast Routing Across Wireless Sensor Networks (Topic DY1) Security Catch me if you can: Intrusion Detection System for WSN (Topic MR1) Optional Topics Sensing the World: From Collection to Visualization (Topic DC2) Even Wireless Sensor Nodes talk IP (Topic DY2) Know your enemy: Security Testing Tool for Contiki OS (Topic MR2) Topics Oct | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick
7 Protecting your Privacy within Online Social Networks (Topic DC1) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick Simplify the settings to guarantee privacy Members of OSN share contents e.g. the pictures of their last parties on Facebook They may not modify or update their default privacy settings because it is cumbersome People may therefore access their private data and discover that their owners e.g. may not only drink water during parties Your Task: Design and implement a privacy-enhanced application controlling the access to pictures based on content and social relationships including: Access control mechanisms Interfaces Integration into an online social network Group task: Group of up to 3 students Contact: Dipl.-Ing. Delphine Christin
8 Fast Routing Across Wireless Sensor Networks (Topic DY1) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick Realtime guarantees still lacking in WSN End-to-end delay is hard to guarantee But important for many app, such as automation SPEED achieves soft realtime communication Your Task: Implement SPEED in contiki Evaluate SPEED and compare it with AODV and CTP (Collection Tree Protocol) Report your ideas and experience Group task: Group of up to 3 students Contact: M. -Sc. Dingwen Yuan
9 Catch me if you can: Intrusion Detection System for WSN (Topic MR1) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick Prevention is not everything Crypto could be broken Insider attacks Novel attacks … Your Task: Get an overview of IDS architectures Design your IDS and implement it Evaluate the IDS Group task: Group of up to 3 students Contact: Dipl. Wirtsch.-Inf. Michael Riecker
10 Sensing the World: From Collection to Visualization (Topic DC2) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick Benefit from sensor data from sensor platforms and mobile phones Sensor nodes can easily be deployed in infrastructures to capture environmental parameters Mobile phones and their embedded sensors are: Deployed at large scale Charged by the users Their mobility pattern follow the streams of the population The combination of both worlds offers innovative applications Your Task: Design and implement a hydride architecture to collect, store and visualize sensor data including: Functions to collect data Storage management Visualization tools Group task: Group of up to 3 students Contact: Dipl.-Ing. Delphine Christin
11 Even Wireless Sensor Nodes talk IP (Topic DY2) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick IPv6 on wireless sensor nodes IPv6 provides solution to “Internet of Things” Sensor nodes are very resource constrained TelosB: 8 MHz mcu with 48kB program flash, 10kB RAM IPv6 stack implemented in contiki OS Small footprint: Code size 11.5kB, RAM usage 1.8kB Time synchronization is a must for WSN apps Your Task: Implement the system clock on contiki nodes Implement NTP protocol on contiki IPv6 Implement other time sync protocols for WSN and evaluate (extra) Report your ideas and experience Group task: Group of up to 2 students, more students with extra task Contact: M. -Sc. Dingwen Yuan
12 Know your enemy: Security Testing Tool for Contiki OS (Topic MR2) | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick WSNs may have many vulnerabilities Unattended nature Limited power Wireless medium … Your Task: Get an overview of existing attacks Implement your Security Testing Tool Evaluate the tool Group task: Group of up to 3 students Contact: Dipl. Wirtsch.-Inf. Michael Riecker