Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

b. Topics with a Network-related Focus


Access Control decentralisation in the IoT environment - open

Goal of this topic is to decentralise/distribute access control mechanisms across a local IoT network.

Currently, Access Control in IoT environment is rather centralised, meaning that Access Control gateways aren't neccesarily near IoT devices, which leaves a big attack plane for hackers.

In this topic, the ultimate goal will be to bring Access Control mechanisms as close as possible to sensors in an IoT system. In order to achieve that, multiple challeges arise - access rights synchronisation, building trust between modules in a distributed system, etc.

Your solution will be developed and integrated as part of COSYLab Smart Home framework.

Note: This topic is only available as P1/P2 or Master's Thesis.

If you're interested, please contact Nemanja Ignjatov (nemanja.ignjatov@univie.ac.at)


Behavior-based Access Control management - open

"Smartify Access Control in the IoT environment by analysing user behaviour patterns"

Make use of the collected data from sensors in a Smart-Home and define events that could be of interest to assigning Access Rights to the users in the system.

This topic requires analysis of the user behavior patterns(waking up time, leaving to work, bed time) in the IoT environment, description of the patterns through system events and application of these events to the composition of access rights.

This solution will be integrated with an already existing Smart-Home management framework, present on COSY:Lab.

Note: This topic is only available as P1/P2 or Master's Thesis.

If you're interested, please contact Nemanja Ignjatov (nemanja.ignjatov@univie.ac.at)


Fog computing-based Smart-Home Web Application based on AMQP protocol - open

Goal of this topic is to build a web application/web application module, that will support publish/subscribe messaging pattern using AMQP protocol.

In order to develop required solution, technical knowledge in networking as well as modern web application technologies( Angular, AngularJS, Bootstrap) is expected.

This topic is tighly connected with the HCI-related topic for the same web application - Interface and Interaction Design of a Web Application for ABAC-enabled Smart-Home management

offered by Christian Löw (check the topic description above).

Final goal of this topic is to develop and evaluate the web application within the COSYLab framework, offering services using AMQP protocol.

If you're interested, please contact Nemanja Ignjatov (nemanja.ignjatov@univie.ac.at)


IoT Identity Management performance simulator - vergeben

Implement tool that can evaluate the compliance of automatic identity management solution in IoT environment.

Goal of this thesis is to build simulation tool that takes into consideration computational effort factors(CPU, memory usage, network delay) for various Identity Management solutions(e.g. PKI, Web of Trust, OpenPGP)

This solution will be further used for long term testing of particular Identity Management systems, with special analysis of adaptability on resource-constrained devices (IoT sensors)

If you're interested, please contact Nemanja Ignjatov (nemanja.ignjatov@univie.ac.at)

...

Network Packet Trace Anonymization - vergeben / already taken

Recordings of network traffic play an important role in studying the network behavior of nodes, applications, and users. Unfortunately, these traces also contain quasi-personally identifiable information (PII) which makes sharing or publishing traces problematic. Develop a tool or extend existing ones (libpcap, Wireshark) to anonymize traces to various degrees. For this, identify types of PII found in traces, and evaluate methods to pseudonymize or otherwise scrub the records.

Note: This project is a great start into the world of Free/Libre Open Source Software (FLOSS)!

If you're interested, please contact Albert Rafetseder (albert.rafetseder@univie.ac.at)


Radio Interference Modeling

Transmissions over radio may suffer interference both from out-of-band and in-band transmissions. Your task is to choose modulation schemes and develop models for interference for them, both within the same modulation scheme and across schemes. Target metrics focus on the demodulated signal and thus the disturbance that interferences cause in the demodulator: effects on the spectral content, noise floor, transmitter/receiver synchronization, etc. You evaluate your models both in theory and in practice, i.e. mathematically and through an implementation in GNU Radio.

If you're interested, please contact Albert Rafetseder (albert.rafetseder@univie.ac.at)


Kibana Statistics Plugins

The Kibana analysis software provides convenient ways to analyze datasets, but it lacks features that help with modeling tasks to (e.g.) describe arrival and service processes from the time series attributes of data. Your task is to remedy this situation. This includes a requirement analysis from modeling tasks performed in the literature, an actual software implementation for Kibana, and a showcase study based on example sensor backhaul data provided by a large Austrian IoT network.

If you're interested, please contact Albert Rafetseder (albert.rafetseder@univie.ac.at)


Promiscuous Mode for the ESP8266

The ESP8266 offers an interesting WiFi-enabled small-scale embedded platform. Your task is to extend the MicroPython firmware available for it to enable its wireless interface's promiscuous mode. This lets an ESP8266 act as a passive WiFi sensing and measurement device. Based on your implementation, you design a distributed experiment with multiple devices that makes use of your new feature, e.g. track WiFi beacons from smartphones across geographical areas in a privacy-preserving manner (paper).

If you're interested, please contact Albert Rafetseder (albert.rafetseder@univie.ac.at)


Load Based Resource Allocation and Licensing in Wireless Networks

Radio channel capacity is a key resource to operate wireless networks. Mobile operators spend a lot of money (typically in the range above 1 bn EUR) to obtain spectrum licenses, which give them exclusive rights to use particular frequency bands. In reality, these frequencies are utilitzed to the full extend only in densely populated areas. In other regions (e.g. rural areas) operators do not need their entire licensed spectrum. Instead of static licenses, the proposed topic focuses on load based licensing schemes: Your task is to create a simple simulation of a dynamic "licensing process" which takes into account the current network load. It is expected to implement a simple assignment algorithm, e.g. a license broker in Matlab. The model should be agent based and object orientated.

If you're interested, please contact Stephan Wirsing (stephan.wirsing@univie.ac.at)