Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

b. Topics with a Network-related Focus

Behavior-based Access Control
decentralisation
management - vergeben

"Smartify Access Control in the IoT environment

- open

Goal of this topic is to decentralise/distribute access control mechanisms across a local IoT network.

Currently, Access Control in IoT environment is rather centralised, meaning that Access Control gateways aren't neccesarily near IoT devices, which leaves a big attack plane for hackers.

In this topic, the ultimate goal will be to bring Access Control mechanisms as close as possible to sensors in an IoT system. In order to achieve that, multiple challeges arise - access rights synchronisation, building trust between modules in a distributed system, etc.

by analysing user behaviour patterns"

Make use of the collected data from sensors in a Smart-Home and define events that could be of interest to assigning Access Rights to the users in the system.

This topic requires analysis of the user behavior patterns(waking up time, leaving to work, bed time) in the IoT environment, description of the patterns through system events and application of these events to the composition of access rights.

This solution will be integrated with an already existing Smart-Home management framework, present on COSY:Lab

Your solution will be developed and integrated as part of COSYLab Smart Home framework

.

Note: This topic is only available as P1/P2 or Master's Thesis.

If you're interested, please contact Nemanja Ignjatov (nemanja.ignjatov@univie.ac.at)


Behavior-
Internet connectivity based Access Control management -
vergeben

"Smartify Access Control in the IoT environment by analysing user behaviour patterns"

Make use of the collected data from sensors in a Smart-Home and define events that could be of interest to assigning Access Rights to the users in the system.

This topic requires analysis of the user behavior patterns(waking up time, leaving to work, bed time) in the IoT environment, description of the patterns through system events and application of these events to the composition of access rights.

This solution will be integrated with an already existing Smart-Home management framework, present on COSY:Lab.

Note: This topic is only available as P1/P2 or Master's Thesis.

If you're interested, please contact Nemanja Ignjatov (nemanja.ignjatov@univie.ac.at)
Internet connectivity based Access Control management - open

Goal of this topic is to embeed internet connectivity as a building block for access control management, leading to the automation of access rights in an existing Smart Home IoT platform.

In order to develop required solution, technical knowledge in networking as well as Java/SpringBoot is expected.

Final goal of this topic is to develop and integrate the software module which enables management of access rights based on existence of internet connection in a Smart Home.

Moreover, attention will be also given to the performances of the solution - minimum delay, access policies reevaluation time, etc.

If you're interested, please contact Nemanja Ignjatov (nemanja.ignjatov@univie.ac.at)
open

Goal of this topic is to embeed internet connectivity as a building block for access control management, leading to the automation of access rights in an existing Smart Home IoT platform.

In order to develop required solution, technical knowledge in networking as well as Java/SpringBoot is expected.

Final goal of this topic is to develop and integrate the software module which enables management of access rights based on existence of internet connection in a Smart Home.

Moreover, attention will be also given to the performances of the solution - minimum delay, access policies reevaluation time, etc.

IoT Identity Management performance simulator - vergeben

Implement tool that can evaluate the compliance of automatic identity management solution in IoT environment.

Goal of this thesis is to build simulation tool that takes into consideration computational effort factors(CPU, memory usage, network delay) for various Identity Management solutions(e.g. PKI, Web of Trust, OpenPGP)

This solution will be further used for long term testing of particular Identity Management systems, with special analysis of adaptability on resource-constrained devices (IoT sensors)

If you're interested, please contact Nemanja Ignjatov (nemanja.ignjatov@univie.ac.at)


IoT Identity Management performance simulator - vergeben

Implement tool that can evaluate the compliance of automatic identity management solution in IoT environment

  • Indoor localization Access Control management - vergeben

"Manage Access Control policies based on presence of users in the Smart-Home"

Integrate some of the existing technologies for localization and presence detection(RDIF, BLE) with ABAC-enabled Smart-Home management system.

Goal of this thesis is to enable definition and validation of the access policies in Smart-Home that required users' presence events as input and allow/forbid particular actions in Smart-Home based on those events.build simulation tool that takes into consideration computational effort factors(CPU, memory usage, network delay) for various Identity Management solutions(e.g. PKI, Web of Trust, OpenPGP)

This solution will be integrated with already existing Smart-Home management framework, present on COSY:Lab.further used for long term testing of particular Identity Management systems, with special analysis of adaptability on resource-constrained devices (IoT sensors)

If you're interested, please contact Nemanja Ignjatov (nemanja.ignjatov@univie.ac.at)


Blockchain-based Smart Home device registry - vergeben

"Use blockchain to make services, features and bugs of IoT devices transparent to all users!"

Implement blockchain-based storage for all types of sensors, which are used inside of Smart Home framework.

This storage should contain information on supported functionalities on the devices, combined with firmware versions of sensors. Moreover, this registry should support option of providing client-side feedback on some sensor services and whether they work properly, so that other Smart Home framework users can become more aware of possible malfunctions and/or security breaches inside their Smart Homes.

Ultimate goal is to achieve trust reputation network, which would make perfect match with blochain properties, such as : backward traceability, immutability and transparency.

If you're interested, please contact Nemanja Ignjatov (nemanja.ignjatov@univie.ac.at)


Traffic And Load Models For ISM- And SRD-Band LoRa - open
LoRa is an emerging proprietary physical-layer modulation technology for IoT WANs; LoRaWAN adds gateways and network uplink to bridge Things to the Internet. This project proposes to investigate traffic on the frequency bands locally used for LoRa (see for example https://www.thethingsnetwork.org/community/vienna/ ) and suggest spatial, spectral, and traffic load models for this new type of data communication. Collaboration with Vienna's community-driven, participatory LoRaWAN installation by https://openiot.network is welcome.
If you're interested, please contact Albert Rafetseder (albert.rafetseder@univie.ac.at)

...