Location Verification in Car2X Communication, Master Thesis Cars exchange information with other vehicles, roadside units, or pedestrians and incorporate this data in, e.g., the navigation system. 5G enables such communication in a decentralized way where participants exchange information directly, meaning that no network infrastructure is needed. The correctness of exchanged location information is crucial for reasonable decision-making and a manipulation can affect the safety of participants in the traffic. In this thesis, you implement a simulation model that allows for imitating the exchange of information between mobile participants in traffic. As part of the evaluation, wou implement a verification mechanism that validates the location information of vehicles.
Measuring Mobile Network Infrastructure, Bachelor Thesis Mobile networks consist of radio towers that provide wireless connectivity, and core networks that are the backbone of the infrastructure. Depending on the commercial operator, the distribution of both radio towers and core networks varies. This not only influences the service that users receive, but can also affect the security and privacy capabilities of the connection. In this thesis, you implement a measurement framework that probes the infrastructures of existing mobile networks. Based on the results of the measurement study, you summarize the results and discuss their implications for the users of the networks.
Biased Overlay Networks, Bachelor/Master Thesis An overlay network provides a service on the application layer and uses the existing infrastructure of the Internet. One example of this is Tor, a system that provides additional security and privacy for online connections. The level of protection that such a connection can offer, however, depends on the infrastructure of the underlying network. For example, if the traffic is routed through countries that monitor and censor Tor, transmissions are much more likely to be targeted by attacks. In this thesis, your analyze the bias that the Internet infrastructure introduces for overlay networks. To this end, you use empirical information of the Internet and match it with the infrastructure of overlay networks. After implementing a simulation model, you analyze how the Internet influences the security and privacy of connections and how it opens up attack vectors.
End-to-End Traffic Analysis Attacks in Mobile Networks, Bachelor Thesis Design and apply end-to-end traffic analysis attacks on 5G mobile traffic. The thesis focuses on the experimental evaluation of statistical attacks and their feasibility.
Remote SIM Implementation, Master Thesis Integrate a remote SIM setup into SRSRAN that allows to switch between multiple physical SIM cards within the software stack implementation of SRSRAN. Verify the correct behavior and conduct measurements in this setup.