Secure Mobile Networking Lab Exercise / Project Summer 2013 Kick-off meeting Prof. Dr.-Ing. Matthias Hollick Technische Universität Darmstadt Secure Mobile Networking Lab - SEEMOO Department of Computer Science Center for Advanced Security Research Darmstadt - CASED Prof. Dr.-Ing. Matthias Hollick [email protected] Mornewegstr. 32 D-64293 Darmstadt, Germany Tel.+49 6151 16-70922, Fax. +49 6151 16-70921 http://seemoo.de or http://www.seemoo.tu-darmstadt.de Overview Lab Exercise (“Praktikum”) Focus on practical implementations Improve hands-on technique and experience But also improve theoretical knowledge Ideally in small groups of 2-3 students Expected work per week per student: 4 hours Project (“Projektpraktikum”) More work than Lab Exercise Expected work per week per student: 6 hours April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 2 Organizational Issues Schedule and deadlines 23.04.2013 (Tuesday), 16:30 Kick-off meeting (Room S4/14 3.2.01) 26.04.2013 (Friday), 23:59 Confirmation of topic with advisor 04.06.2013 (Tuesday), 16:30 Design workshop (Room S4/14 3.2.01) 16.07.2013 (Tuesday), 16:30 Final presentation (Room S4/14 3.2.01) • 23.07.2013 (Tuesday), Code review with advisors • 28.07.2013 (Sunday), 23:59 Submit project report (~6 pages ACM/IEEE format) • • • • April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 3 Topics • • • • • • • • • • • • • • • Effects of cover traffic on a wireless delay-tolerant network (Topic AB1) Implement an Innovative Participative or Privacy-related App (Topic DC1) Attack detection on WMNs employing mobile phones (Topic RDC1) Curved paths: finding a way through enemy territory (Topic AL1) OFDMA: enabling simultaneous medium access in WMNs (Topic AL2) Neither shouting nor whispering: semi-automatic gain control (Topic AL3) Catch me if you can: Intrusion Detection System for a WSN (Topic MR1) Liars and Outliers: Detection of False Data in WSN (Topic MR2) Implementing a Modular Physical Layer in a FPGA (Topic MS1) Hacking the Wireless Spectrum (Topic MS2) Burning the Mesh (Topic MW1) GUI for Click Modular Router (Topic MW2) Mesh Attacks with Click (Topic MW3) Integrate Glossy into TDMA (Topic DY1) Software Defined Radio meets Real Sensor Nodes (Topic DY2) April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 4 Effects of cover traffic on a wireless delay-tolerant network (Topic AB1) What is a wireless (mobile) DTN Nodes can move in and out of range and become isolated Neighbors are only temporary, perhaps only once in the network's lifetime Network graph can split, but nodes can still bridge the “islands” Therefore: end-to-end connection is intermittent, usual approaches may fail Why we want to analyze the effects of cover traffic Goal: to hide the true sender and the true receiver of a message Idea: generate noise to prevent only real messages to be sent However, it may kill the network Your Tasks: Get acquainted with the ONE simulator Group task: Group of up to 3 students Modify it to behave as intended Measure parameters such as throughput, delay, … with varying loads of cover traffic Contact: Msc. Ana Barroso April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick [email protected] 5 Implement an Innovative Participative or Privacy-related App (Topic DC1) Your Task: Design and develop an app in which users: contribute e.g. sensor readings to help the community or visualize how their privacy is protected/endangered Implementation on Android or iOS Implemented functionalities depend on the number of students Group task: Group of up to 5 students Contact: Dr-Ing. Delphine Christin [email protected] sitetalk-info.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 6 Attack detection on WMNs employing mobile phones (Topic RDC1) • Get involved with the WMNs’ basics and understand the standard IEEE 802.11s • Investigate about attacks on WMNs and MANETs in general • Using the mesh network available in the lab, and the mobile phones with an IDS application deployed (I’ll provide you more details), think of either a) the deployment of an existing attack and a detection using these mobile devices, or b) think and deploy a new attack and suggest how to detect it using mobile phones. April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 7 Curved paths: finding a way through enemy territory (Topic AL1) Sending packets over secure routes Bad nodes can manipulate the routing process in WMNs Security mechanisms can identify and locate attackers Face routing allows curves as reference paths Curves can be defined in order to bypass bad areas Your Task: Given the position of the misbehaving nodes, which might be globally known or only known to nodes close to the attackers, find a curve connecting a random pair of nodes that avoids all dangerous areas. Task in detail: Design algorithms for finding valid parametric curves. Curves can change dynamically as packets are relayed Implement and evaluate the algorithms in NetSim 2 Individual or group task; up to 2 students Contact: Adrian Loch [email protected] April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 8 OFDMA: enabling simultaneous medium access in WMNs (Topic AL2) Orthogonal Frequency Division Multiple Access Traditional WMNs are built on the 802.11 MAC protocol, which leads to poor performance in a multihop scenario OFDMA is a promising approach used in next generation cellular networks, but suitable also for WMNs A key advantage of OFDMA is that it allows simultaneous transmissions at nodes, either sending or receiving Your Task: Implement OFDMA in a small toy WMN scenario using the Wireless Open Access Research Platform Software Defined Radio (WARP SDR). Task in detail: Understand how OFDMA works Excellent FPGA knowledge is essential Implement realtime OFDMA on WARP Group task; up to 3-4 students Contact: Adrian Loch [email protected] April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 9 Neither shouting nor whispering: semiautomatic gain control (Topic AL3) Gain Control in Wireless Networks Gain control is crucial for avoiding too large (shouting) as well as too small (whispering) signals at receivers Automatic gain control exists, but can cause unexpected behaviors in a prototyping/test environment Problem becomes harder when concurrent transmissions are performed, as multiple gains need to be adjusted Your Task: Implement a script which empirically determines the best gains for the case of multiple senders transmitting to multiple receivers. Task in detail: Learn about WARPLab (plenty of examples available) Identify automatically too large and too small signals Implement a script for empirical gain adjustment Individual or group task; up to 2 students Contact: Adrian Loch [email protected] April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 10 Catch me if you can: Intrusion Detection System for a WSN (Topic MR1) Prevention is not everything Crypto could be broken Insider attacks Novel attacks … Your Task: Get an overview of IDS architectures Design your IDS and implement it Evaluate the IDS Group task: Group of up to 3 students Contact: Dipl. Wirtsch.-Inf. Michael Riecker [email protected] April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 11 Liars and Outliers: Detection of False Data in WSN (Topic MR2) WSNs are used to… Monitor critical infrastructure Automate industrial processes What about false data? Your Task: Group task: Group of up to 3 students Contact: Dipl. Wirtsch.-Inf. Michael Riecker [email protected] Get an overview of outlier detection techniques Design a local algorithm to detect false data Implement and evaluate the algorithm April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 12 Implementing a Modular Physical Layer in a FPGA (Topic MS1) Your Task: • Implement a real time physical layer in hardware using Xilinx System Generator for Simulink • connect your design to a MicroBlaze processor Previous Knowledge in either: • FPGA Design/System on Chip • Communication Systems (Layer 1) • Low Level Programming in C • MATLAB/Simulink/DSP • Software Defined Radios Contact: Matthias Schulz [email protected] April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 13 Hacking the Wireless Spectrum (Topic MS2) Your Task: • Use Software Defined Radios to attack wireless systems: eavesdropping, jamming, forging, wormholeing, … Previous Knowledge in either: • RTLSDR, USRP, WARP • GnuRadio, Simulink, DSP • Digital/Analog Modulations • Reverse Engineering Contact: Matthias Schulz [email protected] April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 14 Burning the Mesh (Topic MW1) Ad hoc and wireless mesh networks are evolving fast Protecting those networks is hard as there is no central authority Distributed firewalls can help defend the network Your mission: Analyze current research on protecting wireless mesh networks Implement a distributed firewall system using the Click framework (Lab) Contrast firewalls against other protection measures April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 15 GUI for Click Modular Router (Topic MW2) Click is a Modular Network Framework Configurations are composed of modules Each configuration is a directed graph Configurations are stored in text files Your mission: Work your way into the features of the Click configuration language Design an application to create, edit and view Click configurations Implement your application design using state of the art software engineering methods April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 16 Mesh Attacks with Click (Topic MW3) Traditional mesh routing protocols are prone to several attacks Click is a Modular Network Framework which can be used to create a own networking stack Your mission: Analyze state of the art attacks on mesh networks Create an attack system using the Click Framework Evaluate your attack system in our mesh testbed April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 17 Integrate Glossy into TDMA (Topic DY1) Requirement of TDMA A centralized scheduling, for varying deadline requirements, varying topology Accurate time synchronization What Glossy provides Synchronous transmissions for fast network flooding Constructive interference for high reliability Free time synchronization Your Task: Group task: Group of up to 3 students Get familiar with Glossy Write a TDMA with changing topology Use Glossy to download scheduling Contact: Msc. Dingwen Yuan April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick [email protected] 18 Software Defined Radio meets Real Sensor Nodes (Topic DY2) USRP N210 Simple device composed of ADC, DAC and FPGA Can implement arbitrary radio protocol in software A new radio protocol = code recompilation Better link quality estimation Continuous measurement of RSSI and LQI Your Task: Get familiar with USRP and GNU Radio Group task: Group of up to 3 students Make USRP and TelosB nodes talk with each other Contact: Dingwen Yuan Implement continuous link quality measurement. Msc. [email protected] April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick 19
© Copyright 2026 Paperzz