1 / 19

Secure Mobile Networking Lab Exercise / Project

Secure Mobile Networking Lab Exercise / Project. Summer 2013 Kick-off meeting. Prof. Dr.-Ing. Matthias Hollick Technische Universität Darmstadt Secure Mobile Networking Lab - SEEMOO Department of Computer Science Center for Advanced Security Research Darmstadt - CASED Mornewegstr. 32

ingo
Télécharger la présentation

Secure Mobile Networking Lab Exercise / Project

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Mobile Networking Lab Exercise / Project Summer 2013 Kick-off meeting Prof. Dr.-Ing. Matthias Hollick Technische Universität Darmstadt Secure Mobile Networking Lab - SEEMOO Department of Computer Science Center for Advanced Security Research Darmstadt - CASED Mornewegstr. 32 D-64293 Darmstadt, Germany Tel.+49 6151 16-70922, Fax. +49 6151 16-70921 http://seemoo.de or http://www.seemoo.tu-darmstadt.de Prof. Dr.-Ing. Matthias Hollick matthias.hollick@seemoo.tu-darmstadt.de

  2. Overview Lab Exercise (“Praktikum”) • Focus on practical implementations • Improve hands-on technique and experience • But also improve theoretical knowledge • Ideally in small groups of 2-3 students • Expected work per week per student: 4 hours Project (“Projektpraktikum”) • More work than Lab Exercise • Expected work per week per student: 6 hours April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  3. Organizational Issues Schedule and deadlines • 23.04.2013 (Tuesday), 16:30 Kick-off meeting (Room  S4/14 3.2.01) • 26.04.2013 (Friday), 23:59 Confirmation of topic with advisor • 04.06.2013 (Tuesday), 16:30 Design workshop (Room S4/14 3.2.01) • 16.07.2013 (Tuesday), 16:30 Final presentation (Room S4/14 3.2.01) • 23.07.2013 (Tuesday), Code review with advisors • 28.07.2013 (Sunday), 23:59 Submit project report (~6 pages ACM/IEEE format) April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  4. Topics • Effects of cover traffic on a wireless delay-tolerant network (Topic AB1) • Implement an Innovative Participative or Privacy-related App (Topic DC1) • Attack detection on WMNs employing mobile phones (Topic RDC1) • Curved paths: finding a way through enemy territory (Topic AL1) • OFDMA: enabling simultaneous medium access in WMNs (Topic AL2) • Neither shouting nor whispering: semi-automatic gain control (Topic AL3) • Catch me if you can: Intrusion Detection System for a WSN (Topic MR1) • Liars and Outliers: Detection of False Data in WSN (Topic MR2) • Implementing a Modular Physical Layer in a FPGA (Topic MS1) • Hacking the Wireless Spectrum (Topic MS2) • Burning the Mesh (Topic MW1) • GUI for Click Modular Router (Topic MW2) • Mesh Attacks with Click (Topic MW3) • Integrate Glossy into TDMA (Topic DY1) • Software Defined Radio meets Real Sensor Nodes (Topic DY2) April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  5. Effects of cover traffic on a wireless delay-tolerant network (Topic AB1) What is a wireless (mobile) DTN • Nodes can move in and out of range and become isolated • Neighbors are only temporary, perhaps only once in the network's lifetime • Network graph can split, but nodes can still bridge the “islands” • Therefore: end-to-end connection is intermittent, usual approaches may fail Why we want to analyze the effects of cover traffic • Goal: to hide the true sender and the true receiver of a message • Idea: generate noise to prevent only real messages to be sent • However, it may kill the network Your Tasks: • Get acquainted with the ONE simulator • Modify it to behave as intended • Measure parameters such as throughput, delay, …with varying loads of cover traffic Group task: Group of up to 3 students Contact: Msc. Ana Barroso ana.barroso@seemoo.tu-darmstadt.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  6. Implement an Innovative Participative or Privacy-related App (Topic DC1) Your Task: • Design and develop an app in which users: • contribute e.g. sensor readings • to help the community • or • visualize how their privacy is • protected/endangered • Implementation on Android or iOS • Implemented functionalities depend on the number of students Group task: Group of up to 5 students Contact: Dr-Ing. Delphine Christin Delphine.christin@seemoo.tu-darmstadt.de sitetalk-info.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  7. Attack detection on WMNs employing mobile phones (Topic RDC1) • Get involved with the WMNs’ basics and understand the standard IEEE 802.11s • Investigate about attacks on WMNs and MANETs in general • Using the mesh network available in the lab, and the mobile phones with an IDS application deployed (I’ll provide you more details), think of either a) the deployment of an existing attack and a detection using these mobile devices, or b) think and deploy a new attack and suggest how to detect it using mobile phones. April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  8. Curved paths: finding a way through enemy territory (Topic AL1) • Sending packets over secure routes • Bad nodes can manipulate the routing process in WMNs • Security mechanisms can identify and locate attackers • Face routing allows curves as reference paths • Curves can be defined in order to bypass bad areas • Your Task: • Given the position of the misbehaving nodes, which might be globally known or only known to nodes close to the attackers, find a curve connecting a random pair of nodes that avoids all dangerous areas. Task in detail: • Design algorithms for finding valid parametric curves. • Curves can change dynamically as packets are relayed • Implement and evaluate the algorithms in NetSim 2 Individual or group task; up to 2 students • Contact: Adrian Loch adrian.loch@seemoo.tu-darmstadt.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  9. OFDMA: enabling simultaneous medium access in WMNs (Topic AL2) • Orthogonal Frequency Division Multiple Access • Traditional WMNs are built on the 802.11 MAC protocol, which leads to poor performance in a multihop scenario • OFDMA is a promising approach used in next generation cellular networks, but suitable also for WMNs • A key advantage of OFDMA is that it allows simultaneous transmissions at nodes, either sending or receiving • Your Task: • Implement OFDMA in a small toy WMN scenario using the Wireless Open Access Research Platform Software Defined Radio (WARP SDR). Task in detail: • Understand how OFDMA works • Excellent FPGA knowledge is essential • Implement realtime OFDMA on WARP Group task; up to 3-4 students • Contact: Adrian Loch adrian.loch@seemoo.tu-darmstadt.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  10. Neither shouting nor whispering: semi-automatic gain control (Topic AL3) • Gain Control in Wireless Networks • Gain control is crucial for avoiding too large (shouting) as well as too small (whispering) signals at receivers • Automatic gain control exists, but can cause unexpected behaviors in a prototyping/test environment • Problem becomes harder when concurrent transmissions are performed, as multiple gains need to be adjusted • Your Task: • Implement a script which empirically determines the best gains for the case of multiple senders transmitting to multiple receivers. Task in detail: • Learn about WARPLab (plenty of examples available) • Identify automatically too large and too small signals • Implement a script for empirical gain adjustment Individual or group task; up to 2 students • Contact: Adrian Loch adrian.loch@seemoo.tu-darmstadt.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  11. Catch me if you can: Intrusion Detection System for a WSN (Topic MR1) • Prevention is not everything • Crypto could be broken • Insider attacks • Novel attacks • … • Your Task: • Get an overview of IDS architectures • Design your IDS and implement it • Evaluate the IDS Group task: Group of up to 3 students • Contact: Dipl. Wirtsch.-Inf. Michael Riecker michael.riecker@seemoo.tu-darmstadt.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  12. Liars and Outliers: Detection of False Data in WSN (Topic MR2) • WSNs are used to… • Monitor critical infrastructure • Automate industrial processes • What about false data? • Your Task: • Get an overview of outlier detection techniques • Design a local algorithm to detect false data • Implement and evaluate the algorithm Group task: Group of up to 3 students • Contact: Dipl. Wirtsch.-Inf. Michael Riecker michael.riecker@seemoo.tu-darmstadt.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  13. Implementing a Modular Physical Layer in a FPGA (Topic MS1) • Your Task: • Implement a real time physical layer in hardware using Xilinx System Generator for Simulink • connect your design to a MicroBlaze processor • Previous Knowledge in either: • FPGA Design/System on Chip • Communication Systems (Layer 1) • Low Level Programming in C • MATLAB/Simulink/DSP • Software Defined Radios • Contact: Matthias Schulz • matthias.schulz@seemoo.tu-darmstadt.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  14. Hacking the Wireless Spectrum (Topic MS2) • Your Task: • Use Software Defined Radios to attack wireless systems: eavesdropping, jamming, forging, wormholeing, … • Previous Knowledge in either: • RTLSDR, USRP, WARP • GnuRadio, Simulink, DSP • Digital/Analog Modulations • Reverse Engineering • Contact: Matthias Schulz • matthias.schulz@seemoo.tu-darmstadt.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  15. Burning the Mesh (Topic MW1) • Ad hoc and wireless mesh networks are evolving fast • Protecting those networks is hard as there is no central authority • Distributed firewalls can help defend the network • Your mission: • Implement a distributed firewall system using the Click framework (Lab) • Analyze current research on protecting wireless mesh networks • Contrast firewalls against other protection measures April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  16. GUI for Click Modular Router (Topic MW2) • Click is a Modular Network Framework • Configurations are composed of modules • Each configuration is a directed graph • Configurations are stored in text files • Your mission: • Design an application to create, edit and view Click configurations • Work your way into the features of the Click configuration language • Implement your application design using state of the art • software engineering methods April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  17. Mesh Attacks with Click (Topic MW3) • Traditional mesh routing protocols are prone to several attacks • Click is a Modular Network Framework which can be used to create a own networking stack • Your mission: • Create an attack system using the Click Framework • Analyze state of the art attacks on mesh networks • Evaluate your attack system in our mesh testbed April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  18. Integrate Glossy into TDMA (Topic DY1) • Requirement of TDMA • A centralized scheduling, for varying deadline • requirements, varying topology • Accurate time synchronization • What Glossy provides • Synchronous transmissions for fast network flooding • Constructive interference for high reliability • Free time synchronization • Your Task: • Get familiar with Glossy • Write a TDMA with changing topology • Use Glossy to download scheduling Group task: Group of up to 3 students • Contact: Msc. Dingwen Yuan dingwen.yuan@seemoo.tu-darmstadt.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

  19. Software Defined Radio meets Real Sensor Nodes (Topic DY2) • USRP N210 • Simple device composed of ADC, DAC and FPGA • Can implement arbitrary radio protocol in software • A new radio protocol = code recompilation • Better link quality estimation • Continuous measurement of RSSI and LQI • Your Task: • Get familiar with USRP and GNU Radio • Make USRP and TelosB nodes talk with each other • Implement continuous link quality measurement. Group task: Group of up to 3 students • Contact: Msc. Dingwen Yuan dingwen.yuan@seemoo.tu-darmstadt.de April 2013 | Dept. of Computer Science | SEEMOO | Prof. Dr.-Ing. Matthias Hollick

More Related