Controlling a Robotic Arm with 5G, BACHELOR/MASTER Thesis
Industrial facilities use 5G campus networks to control their production units and exchange information. Compared to WiFi setups, such 5G campus networks benefit from the security and performance capabilities of the latest mobile generation. However, we know a series of attacks that enable an adversary to interfere with components in a 5G network setup, and campus networks are not necessarily excluded from this threat.
In this thesis, you build a demonstrator setup that involves a robotic arm and a 5G network component. To this end, you will 3D-print a suitable model, assemble it, and connect it to a 5G lab network under your control. After the assembly, you will setup a toy example that allows you to control the robotic arm through the 5G cellular connection. In the final setup, you conduct a security analysis of the setup and reflect on the individual requirements in an industrial 5G campus network.
Mobile Communication
Location Verification in Car2X Communication, MASTER Thesis
Cars exchange information with other vehicles, roadside units, or pedestrians and incorporate this data in, e.g., the navigation system. 5G enables such communication in a decentralized way where participants exchange information directly, meaning that no network infrastructure is needed. The correctness of exchanged location information is crucial for reasonable decision-making and a manipulation can affect the safety of participants in the traffic.
In this thesis, you implement a simulation model that allows for imitating the exchange of information between mobile participants in traffic. As part of the evaluation, you implement a verification mechanism that validates the location information of vehicles.
Privacy
Biased Overlay Networks, BACHELOR/MASTER Thesis An overlay network provides a service on
the application layer and uses the existing infrastructure of the Internet. One example of this is Tor, a system
that provides additional security and privacy for online connections. The level of protection that such a
connection can offer, however, depends on the infrastructure of the underlying network. For example, if the
traffic is routed through countries that monitor and censor Tor, transmissions are much more likely to be
targeted by attacks. In this thesis, your analyze the bias that the Internet infrastructure introduces for
overlay networks. To this end, you use empirical information of the Internet and match it with the
infrastructure of overlay networks. After implementing a simulation model, you analyze how the Internet
influences the security and privacy of connections and how it opens up attack vectors.
Quantum-Based Untraceable Communication
Implementation and Benchmarking of Classical Traffic Morphing Techniques, BACHELOR Thesis
Classical traffic morphing techniques remain foundational for traffic privacy. Their performance and limits need
to be understood before integrating quantum-inspired ideas.
The thesis involves implementing traffic morphing strategies (e.g., dummy traffic, timing shifts), running
benchmark experiments, and evaluating their effectiveness under known traffic analysis attacks.
Frontend for Visualizing Simulated Traffic Traces, BACHELOR Thesis
Traffic simulations often generate abstract trace files that are hard to interpret. A visual frontend helps
researchers understand how protocols affect observable traffic.
The thesis includes developing a simple web-based interface for viewing packet timelines, flow
diagrams, and adversarial trace reconstructions based on simulation output files.
Extending Mixing Protocols with Quantum-Inspired Randomness Models, MASTER Thesis
Quantum processes can produce randomness distributions that differ from classical pseudorandom generators. These
may help design harder-to-predict mixing strategies.
This thesis will extend existing mixnet-like protocols by integrating non-classical randomness models and
analyze their effects on metadata leakage and traffic flow patterns.
Integration of Adversarial Correlation Attacks into Simulation Testbed, MASTER Thesis
To evaluate metadata leakage, simulation environments must include realistic adversarial models capable of
timing and flow analysis.
The thesis will implement correlation-based traffic analysis attacks (e.g., flow linking, burst timing) as
modular components in the simulation framework, and provide evaluation scenarios comparing defenses from the
SQUID project.