|Dozent/in||Prof. Dr.-Ing. Jochen Schiller|
|Institution||Freie Universität Berlin|
Institute of Computer Science
Computer Systems and Telematics
Students have to meet all deadlines listed in the following schedule. Otherwise s/he will lose the right to take part in the final presentation. Attention at all final presentations is mandatory.
20.04.2014: Choose topics as described below, send the short list to email@example.com.
28.04.2014: All participants will have a topic assigned and contact their advisor.
18.05.2014: Hand in a preliminary outline and reference list to your advisor and firstname.lastname@example.org.
22.06.2014: Hand in your final report to your advisor and email@example.com.
06.07.2014: Hand in your slides to your advisor and firstname.lastname@example.org.
The seminar will take place 17./18.7.14 according to the following schedule:
The presentation will take 20 to 30min plus 10min discussion.
BSc bzw. Vordiplom, Telematik
Links about writing and presenting
Selection of a topic
We offer the following topics for this course. You have to choose 3 topics currently not assigned to anyone (N.N.) and send your short list to email@example.com. Place the topic you are most interested in at position one etc.We will assign you to a topic - if possible - according to your preferences. In case of a collision and your list is exhausted the date/time of your registration determines the order (FCFS). We will tell you the topic or the failure of the assignment.
Topic: Transmission scheduling wireless multi-hop networks
Particular for TDMA based wireless communication, building an efficient transmission schedule is a crucial task. Such a schedule has to avoid collisions and minimize interferences as well as improve performance metrics like latency or throughput. It can be either build in a centralized or a distributed manner. An optimal transmission schedule is also often tightly bound to the application scenario (e.g. convergecast for most wireless sensor networks). Goal of this task is to provide an overview over existing approaches. Studying the graph-theoretical models as well as evaluating the results from experiments based on real implementations and deployments is mandatory in order to derive a thorough overview of this topic.
Advisor: Oliver Hahm
Assigned to: Andreas Lindner
Topic: Managing constrained IoT devices
Conventional network devices are managed using common protocols such as SNMP or Netconf/Yang. Constrained IoT devices do however not have the resources to implement these protocols. Your task is to survey existing approaches of managing constrained devices with a special emphasis on nodes in IPv6 and 6LoWPAN based networks. Your literature study should help to decide on appropriate approaches for network management functionality within the RIOT operating system.
Advisor: Hauke Petersen
Assigned to: Tobias Kloht
Topic: Popular path loss models for the 2.4 GHz ISM band
The simulation of the behavior of radio signals in a populated area / building is a very complex task. It is almost impossible to simulate all relevant environmental parameters which will lead to a reflection, attenuation or cancelation of the radio signal. Nevertheless we need to predict the spatial distribution of 2.4 GHz signals to simulate network algorithms, plan systems or analyze certain effects we see in radio distribution. For this purpose several path loss models have been proposed which use simplified models of radio distribution and therefore allow for a simulation with a certain accuracy. Your task is to research which path loss models are most often used in the academic field. You should try to understand these models and be able to present and compare them.
Advisor: Simon Schmitt
Assigned to: Thomas Tegethoff
Topic: Capture your Data - Revealing Prefix Hijacking in the Internet
Successful data delivery within the Internet is based on a correct mapping of the receiver's IP prefix to the legitimate autonomous systemof the prefix. The only protocol that is deployed to dynamically exchange routing data between Internet domains, namely the Border Gateway Protocol (BGP), follows a loosely coupled trust model. In the original BGP specification there is no mechanism to verify the ownership of an advertised IP prefix. This makes it quite vulnerable against prefix hijacking, i.e., an illegitimate BGP peer claims to own the prefix. However, also misconfiguration may result in the same effect. The goal of this work is to review and to discuss related work that tries to identity prefix hijacking. A good starting point is the paper by Shi, which was published at IMC 2012.
Advisor: Matthias Wählisch
Assigned to: Stephan Arndt
Topic: Misusing the RPKI to Disturb Reachability in the Internet
Using the Resource Public Key (RPKI) toolbox, operators can prevent prefix hijacking. The RPKI allows for cryptographic strong validation of an IP prefix to AS mapping by deploying signed attestation objects. Certificates are bound to a trust chain. Consequently, a parent object may invalidate data of children. In this work, you should analyze current work that discusses the misuse of RPKI. A good starting point is the paper by Cooper et al. published on HotNets 2013.
Advisor: Matthias Wählisch
Assigned to: Maximilian Schmidt
Topic: How hard is it to deploy new protcols in the Internet?
Deploying new protocols in the Internet is challenging, in particular protocols that relate to the network or transport layer. The goal of this work is to review current papers that discuss deployment strategies and identify relevant stakeholders. Furthermore, you should derive more general insights for deploying new protocols. A starting point is the SIGCOMM 2011 paper by Goldberg et al.
Advisor: Matthias Wählisch
Assigned to: Christian Pfahl
Topic: Human Movement Models in Buildings
In the field of disaster prevention as well as in the planning of buildings and several other fields we often need to know how people will move in a building and what happens if the building is very crowded or if special situations occur. As the behavior of a single human being is hard to predict and experiments in that field are complicated to set up we need to use movement models to predict the movement of the people. In the literature several of these models have been proposed - from random waypoint models to complex map based algorithms. You shall gain an overview of popular movement models which can be applied for the movement of people in buildings. Your adviser will give you advice on how to restrict the research to a reasonable subset of algorithms to look on.
Advisor: Stephan Adler
Assigned to: Marcin Nawrocki
Topic: Online mobile data segmentation
With increasing availability of mobile sensing devices online mobile data segmentation becomes an important topic in extracting and processing events. Once the beginning and the end of interesting data in a stream is detected, sophisticated algorithms could be applied to analyze an event in detail. Search for approaches and methods to identify events in data streams on mobile nodes. Your research could start with the following paper: An Adaptive Approach for Online Segmentation of Multi-Dimensional Mobile Data.
Advisor: Martin Seiffert
Assigned to: Robert Schlenz
Topic: Motion Tracking in Body Area Networks
Motion Tracking is an interesting application in domains linke sports, rehabilitation or human computer interaction. Systems which collect all data with sensor nodes and process them on a base station are already developed (e.g. xsens or biosyn) while Systems which process the data in the network itself are still in research. Find out how motion tracking with sensor nodes is done. Search for approaches and methods for in network processing.
Advisor: Martin Seiffert
Assigned to: Dustin Steinack
Topic: The second operating system hiding in every mobile phone
Currently, there is a broad discussion going on about the security of mobile phones as they dominate more eand more Internet access and, thus, many people use them for security critical applications like online banking or remote access to production data. Firewalls and anti-virus software is available, but this can only protect data and processes controled by the "main" processor running the protection software. However, each mobile phone has a built-in radio modem connecting the phone to a base station. This modem also contains a processor and runs an operating system. Is this secure? Are there backdoors? Starting point: http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone