direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Logo der TU Berlin

SE Comunication & Security

Modul: Communication & Security (BINF-KT-SE2.S10)
Semester: Sommersemester 2010
Art: SE (2 SWS / 3 LP)
LV-Nr.: 0435 L 763
Veranstalter: Dr. Fikret Sivrikaya
Dr. Seyit Ahmet Camtepe
Dr.-Ing. Karsten Bsufka
Ort und Zeit: Themenvergabe am 19.04., 18-20 Uhr im TEL 1315


Diese Veranstaltung wird online mit ISIS durchgeführt Bitte melden Sie sich dort an!


Ihre Anmeldung ist zunächst unverbindlich.
Infos zur Anmeldung, zum Einloggen finden sich hier.


Following topics from Communications and Security fields are available:

Topic 1: Securing Android-based Devices

Language: English / German

Trainer: Aubrey-Derrick Schmidt

Smartphones become more and more popular. As the capabilities (cpu, memory, communication, sensing) of these devices increase, they provide mobile computing power that can be used in variety of critical applications. Resulting security and privacy issues become even more series with android open-platform which permits very short innovation cycle for emerge of new smartphone applications without any proper security measures. Our aim in this seminar topic is to identify weaknesses in the Google Android platform and examine appropriate security architectures that can protect against such vulnerabilities.

Topic2: Context-aware Security for Smart Phones

Language: English / German

Trainer: Leonid Batyuk

In the modern world, everything is connected - anytime, anywhere. A mobile computing device has become our everyday companion. In many cases, it adapts to its environment and is aware of its context. Despite this development, security models stayed static and do not regard context information when making security decisions. Context aware security architecture provides a combination of context awareness and traditional access control mechanisms, aiming at a more secure and fine grained access control.

Topic 3: Collaborative Intrusion and Malware Detection

Language: English / German

Trainer: Rainer Bye

Technological improvements and wide acceptance of Internet brings in security challenges such as complex and collaborative attacks. Collaborative methods appear as a promising method for defending against such distributed and complex security threats. CIMD (Collaborative Intrusion and Malware Detection) enables participants to state their objectives and interests for joint intrusion detection. This helps in establishing groups in a distributed manner for the exchange of security-related data such as monitoring or detection results.

Topic 4: Hierarchical Intrusion Detection in Mobile Networks

Language: English / German

Trainer: Stephan Schmidt

Over the last few years, intrusion detection has become one of the most important research areas in the field of network security. In addition, network access technologies are becoming more dynamic and pervasive. Unfortunately, in contrast to cable-bound network topologies, the task of detecting intrusions is quite a bit more complicated in mobile ad hoc networks due to their inherent characteristics: they do not possess a fixed underlying infrastructure and undergo constant topology changes. A hierarchical approach to intrusion detection and response might be used to face these challenges, where the intrusion detection node hierarchy has to be created and maintained as topology changes.

Topic 5: Non-Intrusive User Behavior Analysis Using Computerized Systems

Language: English / German

Trainer: Arik Messerman

There are different ways to authenticate humans to a system. An authentication process consists of the validation of the authorization by any subset of three factors: (i) something you know (password), something you have (smartcard), and something you are (biometrics). Besides classical attacks on password and risk that smartcards can be stolen, biometric have their own disadvantages such as requirement of expensive devices, risk of stolen bio-templates. Moreover existing approaches provide authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process.

Topic 6: Smartphone-based Biometric Solutions

Language: English / German

Trainer: Arik Messerman, Aubrey-Derrick Schmidt

Smartphones come with improved capabilities in very short innovation cycles: new hardware properties, new types of sensors, improved processor and memory. Soon we will all be equipped with a smartphone; so that, a smartphone will be a trusted device where we store our private information including our money. This will require strong authentication mechanisms on the smartphones such as biometrics. Therefore, smartphones with variety of sensors will be used as biometric readers. In this seminar topic, we will exploit the opportunities to convert smartphones into biometric readers, and try to invent new combined biometric methods using the sensors available on the smartphones.

Topic 7: Object-based Human Identification in Smart Homes

Language: English / German

Trainer: Tarik Mustafic

Recent developments in Ambient Assisted Living (AAL) technologies suggest that in the near future home environment will be surrounded with networked intelligent devices and sensors bringing more comfort and safety. Technical requirements for implementation of innovative services in home environment are largely met, but these services have to be supported by non-intrusive and transparent identification systems. Our aim is to investigate object-based recognition of activities of daily life during interaction of inhabitants with the home objects in daily activities.

Topic 8: Secure Communication for Wireless Sensor Networks in Home Environment

Language: English / German

Trainer: Joel Chinnow

Ambient Assisted Living (AAL) technologies bring in variety of sensors which collect information to improve the comfort and safety in home environment. But, the information collected and shared with wireless communication introduces lots of security and privacy concerns. For some applications, existing cryptographic measures may ensure security and privacy. But, a lot other applications requires more innovative solutions. A sensor transmitting whether a window is open or close might be a simple example. Since there are only two states, encryption of the message can not conceal the information. Adversary can easily figure out that first event triggered message after sunrise should be a windows open message no matter how strong the encryption is.

Topic 9: AI Techniques in Intrusion Detection and Evaluation of Intrusion Detection Systems

Language: English / Deutsch

Trainer: Dr.-Ing. Karsten Bsufka

Current Intrusion Detection Systems (IDS) employ various AI techniques to detect intrusions. Based on conference on journal publications a comparison of these techniques shall be created. A related topic is the evaluation of such techniques in the context of intrusion detection. Again a comparison of procedures, data sets and result presentation shall be created.

Topic 10: Dynamic Multi-operator Networking

Language: English / Deutsch

Trainer: Manzoor Ahmed Khan

In 4G heterogeneous wireless networks, we envision that users can have short term contractual agreements with mobile operators and choose to get associated with any one of the suitable mobile operators. To realize this concept, new entrants (small operators / MVNOs / service providers) are encouraged by regulators to be a part of future telecommunication market. In such a scenario, increased mobility of users, ample amount of services, attractive operator offers could result in very frequent handovers that impose additional handover costs. The scope of a seminar work in this research domain can cover one or more of the following topics:

  • Study the handover costs in different scenarios for different applications
  • Session continuity solutions in/among 3GPP/non-3GPP/LTE in multi-operator scenarios.
  • Study / propose the handover reduction solutions in user-centric network selection approaches.
  • Simulating a proposed solution using the OPNET simulator.

Topic 11: P2PSIP vs. RELOAD with SIP Usage Comparison

Language: English / Deutsch

Trainer: Juri Glaß

SIP is an IETF Internet standard for Voice over IP signalling, the protocol is described in RFC 3261 [1]. SIP depends on SIP servers for address lookup. In [2] Schulzrinne, one of the authors of RFC 3261, proposed a simple approach to utilize a DHT (Distributed Hash Table) for address lookup. A DHT is a P2P (Peer-to-Peer) based application. This proposal led to the foundation of a p2psip working group at the IETF and to a number of IETF drafts. However, this working group now works on a p2p overlay called RELOAD (REsource LOcation And Discovery) [3] for which SIP is one applicable usage [4].

In this seminar topic you are expected to describe and compare the two approaches of

  • P2PSIP as proposed in [2], and
  • RELOAD with SIP usage in [3][4]

There should also be a discussion on the relevance of both approaches for today's VoIP infrastructures.

Topic 12: Multi-link Connectivity & Mobility Management in NGNs

Language: English / Deutsch

Trainer: Manzoor Ahmed Khan

There are various solutions for vertical handovers among hetoregeneous wireless access technologies. However, the issue of simultaneous connectivity to multiple technologies of different mobile operators is an interesting research problem that is not well-investigated yet. Potential topics to be covered in this seminar work may include:

  • Mobile IP / SIP based mobility management solutions
  • Tight/loose coupling architectures
  • Mobility management in tight/loose coupling
  • Mobility management solutions in non-coordinated/coordinated mobile operator scenarios with user-centric decision making.
  • Representation of user preferences over multiple technical/non-technical parameters
  • Simulating and testing available solutions using OPNET simulator

Topic 13: Content Filtering

Language: English / Deutsch

Trainer: Babak Shafieian

The SPAM phenomenon defined as a bulk unwanted messages has been a serious concern and issue for the internet-based communication. A wide range of solutions and mechanisms have been intorduced to reduce unsolicited communication. One of the most commonly used solutions to block unwanted messages through analyzing of their contents is the content filtering techniques.Within the scope of this work the concept of content filtering must be described. Furthermore different filtering methods like Bayesian filtering and heuristic algorithms must be identified and reviewed. Finally the major open problems and future directions for research work in this area should be summarized and discussed.

Relevant sources:

  • Tim Sheedy (2005), Content Filtering : Multiple Layers of Threat Protection
  • Richard Clayton (2005), Failures in a Hybrid Content Blocking System
  • Brian Satterfield (2006), Ten Spam-Filtering Methods Explained

Topic 14: Deep Packet Inspection

Language: English / Deutsch

Trainer: Babak Shafieian

The SPAM phenomenon defined as a bulk unwanted messages has been a serious concern and issue for the internet-based communication. A wide range of solutions and mechanisms have been intorduced to reduce unsolicited communication. One of the newly introduced methods to scrutinize the IP communication is Deep Packet Inspection(DPI). A growing number of network services handle packets based on their payloads in addition to the informaion fetched from packet headers. The inspection of packet payload and detecting abnormal communication patterns enable performing of advanced security features like SPAM prevention. Within the scope of this work the concept of Deep Packet Inspection must be described. Furthermore the significant modern deep packet inspection systems and their underlying algorithms must be identified and reviewed. Finally the major open problems and future directions for research work in this area should be summarized and discussed.

Relevant sources:

  • Klaus Mochalski, Hendrik Schulze (2009), Deep Packet Inspection: Technology, Applications & Net Neutrality
  • Fernandes, S. et al. (2009), Slimming Down Deep Packet Inspection Systems
  • Tamer AbuHmed et al. (2008), Deep Packet Inspection for Intrusion Detection Systems

Topic 15: Presence in an IMS based IPTV service environment

Language: English / Deutsch

Trainer: Stefan Marx

A SIP based presence system is well defined by the IETF and standardisation institutions like the Open Mobile Alliance. Presence Servers acting as Application Servers on the top of the IP Multimedia Subsystem (IMS) collect presence information from presence entities (e.g. User Equipment), process the information and deliver it to presence watcher. The ETSI TISPAN is working on specifications concerning the IP Multimedia Subsystem (IMS) based realisation of IPTV services, that make use of presence services, too (e.g.: which user is currently watching which TV channel ?). The aim of this seminar is to get familiar with a SIP/IMS based presence system and how to apply and extend this to an IMS based IPTV presence system. Requirements: knowledge in IMS and related protocols.

Topic 16: Publish Subscribe for the Future Internet

Language: English / Deutsch

Trainer: Torsten Schmidt

The information-centric usage of today’s Internet has changed our daily lives with regard to content generation, consumption and communication patterns. We can observe that a large share of the Internet’s usage today is essentially publish/subscribe (PubSub) in nature. For Example:

  • Dissemination of software updates
  • Delivery of breaking news announcements
  • General media broadcasting (e.g. audio/video)
  • Periodic and aperiodic messaging (e.g. IM, Twitter)

While PubSub systems have been widely studied and employed for specific event-dissemination applications [1], the host-centric nature of the Internet doesn't support PubSub patterns inherently. For this reason ongoing research investigates the suitability and benefits of moving the PubSub layer downwards into the networking stack to form the future internet. This challenging objective where naming, routing, forwarding and addressing get fresh semantics, should be surveyed during the course of the seminar. The main focus should rely on publications from the ongoing EU funded PSIRP project [2].


Dr. Seyit Ahmet Camtepe

Office: TEL 1409 (Ernst-Reuter-Platz 7)

Office Hours: Wednesday 10:00AM – 12:00AM (Tentative)


Dr.-Ing. Karsten Bsufka

Office: TEL 1303


Dr. Fikret Sivrikaya

Office: TEL 1410