Open Topics

BA/MA Theses

Topic of interest (not limited to IoT)

  • Establishment of bidirectional communication (e.g., for updating purposes of intervals)
  • Extension of visualization mechanisms
  • Indoor localization and their security vulnerabilities
  • Linkage of other sensor networks using different operating systems and hardware to CoMaDa and WebMaDa
  • Implementation of security solutions (pdf)
  • Optimization of system lifetime using energy harvesting mechanisms
  • ... and more!

Topics (BA/MA) in cooperation with the DLR:

  • Distributed Trust in Mobile Environments for Digital Aeronautical Communications (pdf)
  • Security Architecture for LDACS (pdf)

Topics (BA/MA) in cooperation with the BND:

  • Automotive Security
  • Open Source Intelligence

Topic descriptions are partially online else available on request!

Different ideas exist? Come over and talk!

Competence Trainings (ger. Kompetenztraining; currently only German title announced, English no problem)

  • AAA Management --> Kurzbeschreibung
  • Datenfilterung --> Kurzbeschreibung
  • Implementation einer automatisierte Routine im WebMaDa-Admin Tool zum Löschen von WSNs in MySQL-Datenbank
  • Implementierungsarbeiten zur Visualization von Sensordaten um Endusern flexiblere Darstellungen zu ermöglichen --> Kurzbeschreibung
  • Integration eines Updatemechanismus für Messintervalle in SecureWSN nach dem Prinzip der bidiektionaler Kommunikation

Different ideas exist? Come over and talk!

Running and Advised Theses

@ Research Institute CODE, University of Federal Armed Forces Munich, Munich, Germany

Theses marked with * are supervised at the Ludwig-Maximilian University and Hochschule München.

Running Theses

  • Aggregation Support in Constrained Networks following TinyIPFIX under RIOT OS - Johanna Reiml (BA), pdf (*)
  • Certificateless DTLS Support in a Constrained Network under RIOT OS - Kevin Edmonds (MA), pdf (*)
  • Code-Documentation of WebMaDa in SecureWSN - Dimitry Uvarov (BA), pdf (*)
  • Controller-based Routing in Mobile Ad-hoc Networks - Maximilian Tränkler (BA) (*)
  • Control Plane Security of LDACS - Michael Glaubitz (MA)
  • Design and Implemetation of a Code-Staging Solution for WebMaDa - Dario Schaumburger (MA), pdf
  • Design & Implementation of a Raspberry Pi Gateway for SecureWSN - Jan Gabriel (BA) (*)
  • Gathering Environmental Data using TinyIPFIX under RIOT OS - Yacine Mohammed (MA) (*)
  • Identity-based Cryptography under RIoT OS - Maximilian Dufter (MA) (*)
  • Integration of Warning Mechanism into WebMaDa for Abnormal Node Behavior - Marcel Mack (BA) (*), (pdf)
  • Integration of room plans to visualize received measurements - Samson Quitt (BA), pdf (*)
  • Role/Attribute-based Privilege Management for WebMaDa - Wolfgang Edinger (MA) (*)
  • Sicherheitskonzept für Fahrzeugarchitekturen mit Fokus auf ein spezifisches Angriffsscenario - Jakob Pachmann (BA) (*)
  • Waiting for you!

Concluded Master Thesis

  • ID-based Signing with Group IKEv2 in Constrained Networks - Konrad Haslberger(*)

Concluded Bachelor Theses

  • Creation of a home automation system linked to SecureWSN - Marvin Weber (*)
  • Design and Implementation of a Geospatial IoTNaming System: Database and Web Application - Dario Schaumburger
  • Design and Implementation of a Geospatial IoTNaming System: Geographic Polygons - Alexander Nussbaum
  • DTLS-based Security Solution for Constrained Devices using Contiki - Julian Sturm (*)
  • Entwicklung einer automatisierten Schwachstellenanalyse der Automotive Cloud - Benno Appelmann
  • Raspberry Pi CoMaDa Instance Supporting Different Operating Systems and Features in Parallel - Yanal Al-Shool (BA) (*)
  • TinyIPFIX-based Data Collection in Constrained Networks under RIOT OS - Thomas Holger (*)
  • Trustworthiness Check for Environmental Measurements in CoMaDa - Philipp Pfefferkorn (*)
  • USB Port Hacking in an Automotive Setting - Hans Lenhard

Concluded Competence Trainings

  • Qualitätssicherung der Weboberfläche des mobilen Frameworks von SecureWSN - Marie-Claire Hanschmann
  • Upgrading SecureWSN's Virtual Machine - Lukas Kaltenbach (Competence Training)
  • SecureWSN's Virtual Machine Migration - Dario Schaumburger

@ Communication Systems Group, Department of Informatics, University of Zurich, Switzerland

Concluded Bachelor Theses

  • Data Gathering in Wireless Sensor Networks using IPFIX under Contiki - Michael Meister
  • Design and Implementation of a Module Framework for Sensor Data Management - Christian Ott
  • ECC-based Security Solution for Contiki-based Sensor Networks - Madeleine von Heyl
  • Handling of Privilege Requests in WebMaDa - Dominik Buenzli
  • Security, Privacy, and Transparency Improvements of CoMaDa - Michael Balmer
  • Secure Data Transmission in Contiki-based Constrained Networks Offering Mututal Authentication - Serverin Siffert
  • several further theses as second supervisor

Concluded Master Theses

  • Design and Implementation of a Mobile App to Access and Manage Wireless Sensor Networks - Michael Keller
  • Design, Implementation, and Evaluation of an Object Tracking Motion Detection System - Jan Meier
  • Reliable Beacon Detection - Robin Engbersen
  • Optimization of Two-way Authentication Protocol in Internet of Things - Martin Noack
  • Secure Position Data Transmission for Object Tracking using LoRaWAN - Matthias Diez
  • Secure Pull Request Development for TinyIPFIX in Wireless Sensor Network - Claudio Anliker
  • Security Improvement for Object Tracking in IoT - Stefanie Ziltener
  • Value-Network-Analysis for IoT Platforms - Yves Steiner

Concluded Assignments (VA)

  • Classification and Analysis of Security Protocols and Algorithms for Constrained Networks - Niko van Wyk
  • CoMaDa Extension Addressing Transparency Request for Data Owners - Michael Balmer
  • Database Solution for Sensor Data with Authorized Data Access Solution - Christian Ott
  • Design of a DDoS Filtering System for Regional Customers Protection - Laurenz Shi
  • Extending the Graphical User Interface CoMaDa with Contiki Support - Sebastian Pinegger
  • Guideline for Mapping Security Solutions of Wireless Sensor Networks to Security Fundamentals - Stefan Mussato
  • Modular ADCP Parser - Christian Ott
  • Offline Method for Graphical Visualization of Sensor Data - Tim Strasser
  • Security challenges in contactless payments solutions - Christian Killer
  • WebMaDa Extension Addressing Transparency Request for Data Owners - Neva Silvestri

Concluded Software Project (SP)

  • Development of a Minimum Spanning Tree Algorithm as a Software-Defined Networking Application - Alexander Hofmann
  • Modeling and Simulating a Green Traffic Engineering tool applied to an SDN environment - Alexander Hofmann
  • Optimization of TinyIPFIX Implementation in Contiki and Realtime Visualization of Data - Livio Sgier
  • Routing for Energy Efficiency in Software-Defined-Network

Concluded Computer Science Internship

  • TinyIPFIX Aggregation in Contiki - Livio Sgier

@ Chair for Network Architectures and Services, Department of Computer Science, Technische Universität München, Germany

Concluded Bachelor Theses

  • Bidirectional Data Querying with TinyIPFIX - Philip Wenger
  • Data Aggregation using TinyIPFIX in Wireless Sensor Networks - Benjamin Ertl
  • Data Collection in a Wireless Sensor Network for Autonomic Home Networking - Thomas Kothmayr
  • Framework Development for Wireless Sensor Networks facing Configuration and Information Exchange/Export Tasks - Andre Freitag
  • Kommunikationsstandards in Wireless Sensor Networks - Lukas Tillmann
  • Leistungsbewertung von Routingprotokollen in drahtlosen Sensornetzen - Tsvetko Tsvetkov
  • Secure communication in Wireless Sensor Networks - Andreas Schaumeier

Concluded Master Theses

  • A Security Architecture for Wireless Sensor Networks based on DTLS - Thomas Kothmayr (in Cooperation with CSIRO, Brisbane, Australia)
  • DTLS implementation for constraint sensor hardware - Philipp Lowack
  • Implementierung und Leistungsbewertung von Kommunikationsprotokollen auf Sensorknoten - Thema 2: Routing - Konrad Winsduz

Concluded SEPs

  • Network Access Control based on Platform Integrity Measurement - Simon Stauber
  • Secure Enrollment of Certificates for User Authentication - Michael Bothmann

Concluded Zulassungsarbeit

  • Security analysis for very constrainted objects - Christian Liedl