AG Technische Informatik

Technische Informatik





Prof. Dr.-Ing. Jochen Schiller


Freie Universität Berlin

Institute of Computer Science

Computer Systems and Telematics



SS 14





Maximale Teilnehmerzahl




Students have to meet all deadlines listed in the following schedule. Otherwise s/he will lose the right to take part in the final presentation. Attention at all final presentations is mandatory.

20.04.2014: Choose topics as described below, send the short list to

28.04.2014: All participants will have a topic assigned and contact their advisor.

18.05.2014: Hand in a preliminary outline and reference list to your advisor and

22.06.2014: Hand in your final report to your advisor and

06.07.2014: Hand in your slides to your advisor and

The seminar will take place 17./18.7.14 according to the following schedule:

17.07.2014  Time Room SR137
How hard is it to deploy new protcols in the Internet? 10:00-10:45 Pfahl
Popular path loss models for the 2.4 GHz ISM band 10:45-11:30 Tegethoff
Motion Tracking in Body Area Networks 11:30-12:15 Steinack
Transmission scheduling wireless multi-hop networks 13:15-14:00 Lindner
Managing constrained IoT devices 14:00-14:45 Kloht
Capture your Data - Revealing Prefix Hijacking in the Internet 14:45-15:30 Arndt
18.07.2014   Room K40
The second operating system hiding in every mobile phone 9:00-9:45 Ribisch
Human Movement Models in Buildings 9:45-10:30 Nawrocki
Online mobile data segmentation 10:30-11:15 Schlenz
Misusing the RPKI to Disturb Reachability in the Internet 11:15-12:00 Schmidt

 The presentation will take 20 to 30min plus 10min discussion.






BSc bzw. Vordiplom, Telematik


Selection of a topic

We offer the following topics for this course. You have to choose 3 topics currently not assigned to anyone (N.N.) and send your short list to Place the topic you are most interested in at position one etc.We will assign you to a topic - if possible - according to your preferences. In case of a collision and your list is exhausted the date/time of your registration determines the order (FCFS). We will tell you the topic or the failure of the assignment.

Topic: Transmission scheduling wireless multi-hop networks

Particular for TDMA based wireless communication, building an efficient transmission schedule is a crucial task. Such a schedule has to avoid collisions and minimize interferences as well as improve performance metrics like latency or throughput. It can be either build in a centralized or a distributed manner. An optimal transmission schedule is also often tightly bound to the application scenario (e.g. convergecast for most wireless sensor networks). Goal of this task is to provide an overview over existing approaches. Studying the graph-theoretical models as well as evaluating the results from experiments based on real implementations and deployments is mandatory in order to derive a thorough overview of this topic.

Advisor: Oliver Hahm

Assigned to: Andreas Lindner

Topic: Managing constrained IoT devices

Conventional network devices are managed using common protocols such as SNMP or Netconf/Yang. Constrained IoT devices do however not have the resources to implement these protocols. Your task is to survey existing approaches of managing constrained devices with a special emphasis on nodes in IPv6 and 6LoWPAN based networks. Your literature study should help to decide on appropriate approaches for network management functionality within the RIOT operating system.

Advisor: Hauke Petersen

Assigned to: Tobias Kloht

Topic: Popular path loss models for the 2.4 GHz ISM band

The simulation of the behavior of radio signals in a populated area / building is a very complex task. It is almost impossible to simulate all relevant environmental parameters which will lead to a reflection, attenuation or cancelation of the radio signal. Nevertheless we need to predict the spatial distribution of 2.4 GHz signals to simulate network algorithms, plan systems or analyze certain effects we see in radio distribution. For this purpose several path loss models have been proposed which use simplified models of radio distribution and therefore allow for a simulation with a certain accuracy. Your task is to research which path loss models are most often used in the academic field. You should try to understand these models and be able to present and compare them.

Advisor: Simon Schmitt

Assigned to: Thomas Tegethoff

Topic: Capture your Data - Revealing Prefix Hijacking in the Internet

Successful data delivery within the Internet is based on a correct mapping of the receiver's IP prefix to the legitimate autonomous systemof the prefix. The only protocol that is deployed to dynamically exchange routing data between Internet domains, namely the Border Gateway Protocol (BGP), follows a loosely coupled trust model. In the original BGP specification there is no mechanism to verify the ownership of an advertised IP prefix. This makes it quite vulnerable against prefix hijacking, i.e., an illegitimate BGP peer claims to own the prefix. However, also misconfiguration may result in the same effect. The goal of this work is to review and to discuss related work that tries to identity prefix hijacking. A good starting point is the paper by Shi, which was published at IMC 2012.

Advisor: Matthias Wählisch

Assigned to: Stephan Arndt

Topic: Misusing the RPKI to Disturb Reachability in the Internet

Using the Resource Public Key (RPKI) toolbox, operators can prevent prefix hijacking. The RPKI allows for cryptographic strong validation of an IP prefix to AS mapping by deploying signed attestation objects. Certificates are bound to a trust chain. Consequently, a parent object may invalidate data of children. In this work, you should analyze current work that discusses the misuse of RPKI. A good starting point is the paper by Cooper et al. published on HotNets 2013.

Advisor: Matthias Wählisch

Assigned to: Maximilian Schmidt

Topic: How hard is it to deploy new protcols in the Internet?

Deploying new protocols in the Internet is challenging, in particular protocols that relate to the network or transport layer. The goal of this work is to review current papers that discuss deployment strategies and identify relevant stakeholders. Furthermore, you should derive more general insights for deploying new protocols. A starting point is the SIGCOMM 2011 paper by Goldberg et al.

Advisor: Matthias Wählisch

Assigned to: Christian Pfahl

Topic: Human Movement Models in Buildings

In the field of disaster prevention as well as in the planning of buildings and several other fields we often need to know how people will move in a building and what happens if the building is very crowded or if special situations occur. As the behavior of a single human being is hard to predict and experiments in that field are complicated to set up we need to use movement models to predict the movement of the people. In the literature several of these models have been proposed - from random waypoint models to complex map based algorithms. You shall gain an overview of popular movement models which can be applied for the movement of people in buildings. Your adviser will give you advice on how to restrict the research to a reasonable subset of algorithms to look on.

Advisor: Stephan Adler

Assigned to: Marcin Nawrocki

Topic: Online mobile data segmentation

With increasing availability of mobile sensing devices online mobile data segmentation becomes an important topic in extracting and processing events. Once the beginning and the end of interesting data in a stream is detected, sophisticated algorithms could be applied to analyze an event in detail. Search for approaches and methods to identify events in data streams on mobile nodes. Your research could start with the following paper: An Adaptive Approach for Online Segmentation of Multi-Dimensional Mobile Data.

Advisor: Martin Seiffert

Assigned to: Robert Schlenz

Topic: Motion Tracking in Body Area Networks

Motion Tracking is an interesting application in domains linke sports, rehabilitation or human computer interaction. Systems which collect all data with sensor nodes and process them on a base station are already developed (e.g. xsens or biosyn) while Systems which process the data in the network itself are still in research. Find out how motion tracking with sensor nodes is done. Search for approaches and methods for in network processing. 

Advisor: Martin Seiffert

Assigned to: Dustin Steinack

Topic: The second operating system hiding in every mobile phone

Currently, there is a broad discussion going on about the security of mobile phones as they dominate more eand more Internet access and, thus, many people use them for security critical applications like online banking or remote access to production data. Firewalls and anti-virus software is available, but this can only protect data and processes controled by the "main" processor running the protection software. However, each mobile phone has a built-in radio modem connecting the phone to a base station. This modem also contains a processor and runs an operating system. Is this secure? Are there backdoors? Starting point:

Advisor: Jochen Schiller

Assigned to: Lukas Ribisch