Open Topics
BA/MA Theses
Topics of interest within SecureWSN (IoT area)
- none available at the moment
Topics (BA/MA) in cooperation with external partners:
- Exploring LoRaWAN Technology - A Comparative Analysis of Network Features, Coverage, and Security (pdf, Internship/BA/MA)
- Analysis of UWB Communication Protocols in Modern Smartphones (pdf, Internship/BA/MA)
- Mobile Communication RRC Message Security Analysis (pdf, MA)
- Mobile Communication Broadcast Message Security Analysis (pdf, MA)
- Similarity Search for Network Traffic Fingerprinting in the Internet of Things (IoT) (pdf, BA/MA)
- Implementation and Evaluation of a WLAN Stealth Mode in Android (pdf, BA/MA)
Topic descriptions are partially online else available on request!
The content of the proposed topics will be adapted to the thesis type and can be shifted a bit based on discussions and interest.
Different ideas exist? Come over and talk!
Competence Trainings (ger. Kompetenztraining; currently only German title announced, English no problem)
- Aktualisierung von Sicherheitsfeatures in SecureWSN
- Auslagerung von Bibliotheken in Konfigurationsdateien für WebMaDa
- Integration eines Updatemechanismus für Messintervalle in SecureWSN nach dem Prinzip der bidiektionaler Kommunikation
- Qualitätssicherung der Weboberfläche des mobilen Frameworks von SecureWSN
- Technische Analyse von Kommunikationsstandards
Different ideas exist? Come over and talk!
Running and Advised Theses
@ Research Institute CODE, University of Federal Armed Forces Munich, Munich, Germany (Status Sep. 24, 2024)
Theses marked with * are supervised at the Ludwig-Maximilian University.
Running Theses/Trainings
- Analyse und Umwandlung von TEMS Logs zu PCAP (BA) (*)
- Automated Identification of Web Service Binaries in IoT Linux Firmware Samples (BA) (*)
- Enrichment of BLE devices Advertisements with Location Information in Android (BA) (*)
- Entwicklung eines Modells für Handlungsanweisungen zur Abwehr von Cyberangriffen (BA) (*)
- HAIFA 2.0 - Home Automation in RUST (BA)
- Reducing Attack Surfaces in Containerized Environments Through Threat Modeling (MA) (*)
- Waiting for you!
Concluded Ph.D. (1. Supervisor)
- Trustworthy Context-Aware Access Control in IoT Environments Based on the Fog Computing Paradigm
Concluded Master Thesis (parts with industry)
- Advanced Drone Communication Analysis
- Analysis of Tracker Network APIs (*)
- Certificateless DTLS in Wireless Sensor Networks (*)
- Control Plane Security of LDACS
- Design and Development of an Urban Air Traffic Flow Management Module for Deconfliction (*)
- Design and Implemetation of a Code-Staging Solution for WebMaDa
- Evaluating Trust Solution in Digital Aeronautical Communications Systems (*)
- Implementation and Evaluation of an ETSI compliant MEC System (*)
- ID-based Signing with Group IKEv2 in Constrained Networks (*)
- Implementation of an ETSI-compliant Object Recognition MEC App with Focus on Communication to Edge Devices (*)
- Role/Attribute-based Privilege Management for WebMaDa (*)
- Quantum Secure Public-Key Encryption in IoT Networks (*)
- Schwachstellenanalyse Mercedes "Hermes" Head Unit (HU) und Telematic Control Unit (TCU)
- Secure Routing in Aeronautical Ad-Hoc Networks (*)
- Single Common Information Service Provider for Constrained Networks (*)
Concluded Bachelor Theses (parts with industry)
- ADIP - An Android Device ID And Parameter Display App (*)
- Aggregation Support in Constrained Networks following TinyIPFIX under RIOT OS (*)
- Automated Identification of Proprietary Web Service Binaries
- Automatisierte IT-Security-Tests im Software-Entwicklungsprozess - Einsatz von Schwachstellenscannern (*)
- Automatisierung des Labelings von IoT-Kommunikationsdatenstr¨omen im maschinellen Lernen (*)
- Benchmarking für Basisfunktionalitäten in WebMaDa (*)
- Capabilities and Limitations of Localization Mechanism in 5G Mobile Networks (*)
- Code-Documentation of WebMaDa in SecureWSN (*)
- Comparison of Machine Learning Classification Architectures for IoT Communication Data (*)
- Controller-based Routing in Mobile Ad-hoc Networks (*)
- Creation of a home automation system linked to SecureWSN (*)
- Design & Implementation of a Raspberry Pi Gateway for SecureWSN (*)
- Design and Implementation of a Geospatial IoTNaming System: Database and Web Application
- Design and Implementation of a Geospatial IoTNaming System: Geographic Polygons
- DTLS-based Security Solution for Constrained Devices using Contiki (*)
- DTLS Key Establishment in Wireless Sensor Networks (*)
- Entwicklung einer automatisierten Schwachstellenanalyse der Automotive Cloud
- Evaluation des Potenzials hfürherwertiger SIBs (System Information Broadcast) in 5G und 4G Netzen (*)
- Evaluation of open-source web application vulnerability scanners (*)
- FBS GUARD - A False Base Station Detection Tool for Modern Cellular Communication Standards (*)
- Feature Engineering IEEE 802.15.4 Wireless Personal Area Network (WPAN) Communication Data (*)
- Function Fingerprinting in 5G Core Networks (*)
- Implementation and Analysis of the TOR protocol for Edge Cloud architecture (*)
- Indoor Localization under RIOT OS (*)
- Indoor Localization without GPS under RIOT OS (*)
- IoT-Security for BPL-Access-Networks in Critical Infrastructures (*)
- Untersuchung des Zusammenhangs zwischen Zellmorphologie und Zellmobilität (*)
- MARTEN 2.0 - Dynamic Trust Check (*)
- Migrating and Evaluating Obfuscator-LLVM (*)
- Network Ownership Transfer of WSNs Inside a Closed Network
- Optimization of Processing and Validation of Incoming Sensor Data in an Improved Development Environment (*)
- Performance Analysis of Standard Lightweight Block Ciphers in Comparison to AES (*)
- Predicting Movement Paths From Cell Change Events (*)
- Radio Resource Control: Angriffsklassifikationen und exemplarische Implementierung (*)
- Raspberry Pi CoMaDa Instance Supporting Different Operating Systems and Features in Parallel (*)
- Recognition of Text Origin in German Language using ML Classification Models (*)
- Requirement Analysis and Recommendations for Future Quantum-Safe Certificateless Solutions in Constrained Networks (*)
- Sicherheitskonzept für Fahrzeugarchitekturen mit Fokus auf ein spezifisches Angriffsscenario
- Simulation of Antenna Placement for Communication- and Navigation-Infrastructure (*)
- Standard-based Threat Analysis of WebMaDa (*)
- TinyIPFIX-based Data Collection in Constrained Networks under RIOT OS (*)
- Trustworthiness Check for Environmental Measurements in CoMaDa (*)
- USB Port Hacking in an Automotive Setting
- Vergleichende Analyse von BLE Tags inkl. Dissektorenentwicklung (*)
- Visualization of Collector Status with Interaction Triggering in a Dynamic Floor Map (*)
- XACML Policy Verification for Attribute Based Access Control by AI Deployment (*)
Concluded Competence Trainings
- Bidirectional communication in constrained devices
- Data Filtering Options Extension - Part 1
- Data Filtering Options Extension - Part 2
- Dockerimagebildung unter RIOT-OS auf Raspberry Pi - Part 1
- Dockerimagebildung unter RIOT-OS auf Raspberry Pi - Part 2
- Einarbeitung in die Python Programmierung unter Linux
- Qualitätssicherung der Weboberfläche des mobilen Frameworks von SecureWSN
- Upgrading SecureWSN's Virtual Machine
- SecureWSN 's Virtual Machine Migration
@ Communication Systems Group, Department of Informatics, University of Zurich, Switzerland
Concluded Bachelor Theses
- Data Gathering in Wireless Sensor Networks using IPFIX under Contiki
- Design and Implementation of a Module Framework for Sensor Data Management
- ECC-based Security Solution for Contiki-based Sensor Networks
- Handling of Privilege Requests in WebMaDa
- Security, Privacy, and Transparency Improvements of CoMaDa
- Secure Data Transmission in Contiki-based Constrained Networks Offering Mututal Authentication
- several further theses as second advisor
Concluded Master Theses
- Design and Implementation of a Mobile App to Access and Manage Wireless Sensor Networks
- Design, Implementation, and Evaluation of an Object Tracking Motion Detection System
- Reliable Beacon Detection
- Optimization of Two-way Authentication Protocol in Internet of Things
- Secure Position Data Transmission for Object Tracking using LoRaWAN
- Secure Pull Request Development for TinyIPFIX in Wireless Sensor Network
- Security Improvement for Object Tracking in IoT
- Value-Network-Analysis for IoT Platforms
- several further theses as second advisor
Concluded Assignments (VA)
- Classification and Analysis of Security Protocols and Algorithms for Constrained Networks
- CoMaDa Extension Addressing Transparency Request for Data Owners
- Database Solution for Sensor Data with Authorized Data Access Solution
- Design of a DDoS Filtering System for Regional Customers Protection
- Extending the Graphical User Interface CoMaDa with Contiki Support
- Guideline for Mapping Security Solutions of Wireless Sensor Networks to Security Fundamentals
- Modular ADCP Parser
- Offline Method for Graphical Visualization of Sensor Data
- Security challenges in contactless payments solutions
- WebMaDa Extension Addressing Transparency Request for Data Owners
Concluded Software Projects (SP)
- Development of a Minimum Spanning Tree Algorithm as a Software-Defined Networking Application
- Modeling and Simulating a Green Traffic Engineering tool applied to an SDN environment
- Optimization of TinyIPFIX Implementation in Contiki and Realtime Visualization of Data
- Routing for Energy Efficiency in Software-Defined-Network
Concluded Computer Science Internship
- TinyIPFIX Aggregation in Contiki
@ Chair for Network Architectures and Services, Department of Computer Science, Technische Universität München, Germany
Concluded Bachelor Theses
- Bidirectional Data Querying with TinyIPFIX
- Data Aggregation using TinyIPFIX in Wireless Sensor Networks
- Data Collection in a Wireless Sensor Network for Autonomic Home Networking
- Framework Development for Wireless Sensor Networks facing Configuration and Information Exchange/Export Tasks
- Kommunikationsstandards in Wireless Sensor Networks
- Leistungsbewertung von Routingprotokollen in drahtlosen Sensornetzen
- Secure communication in Wireless Sensor Networks
Concluded Master Theses
- A Security Architecture for Wireless Sensor Networks based on DTLS (in Cooperation with CSIRO, Brisbane, Australia)
- DTLS implementation for constraint sensor hardware
- Implementierung und Leistungsbewertung von Kommunikationsprotokollen auf Sensorknoten - Thema 2: Routing
Concluded SEPs
- Network Access Control based on Platform Integrity Measurement
- Secure Enrollment of Certificates for User Authentication
Concluded Zulassungsarbeit
- Security Analysis For Very Constrainted Objects