43
Information Session for the Master-Seminar Sensor Nodes: Operation Modes, Networks and Applications SS 2011 Prof. Baumgarten, Prof. Carle, Corinna Schmitt, Alexander Klein, Christoph Söllner

Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

Information Session for

the

Master-Seminar

Sensor Nodes:

Operation Modes, Networks and Applications

SS 2011

Prof. Baumgarten, Prof. Carle,

Corinna Schmitt, Alexander Klein, Christoph Söllner

Page 2: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

22

Administration

Responsibilities

Appointments and Deadlines

Grading

Introduction to offered topics

Sensor Nodes

Network Topologies

Operating Systems

Middleware Concepts

Applications–

Much more …

Topic selection

Page 3: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

33

Administration

Responsibilities

Appointments and Deadlines

Grading

Introduction

to offered

topics

Topic selection

Page 4: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

44

Responsibilities and Appointments

Organisation:

Prof. Baumgarten, Prof. Carle, Schmitt, Klein, Söllner

Appointment:

Block Seminar –

2 days (9 a.m. -

6 p.m.)

planned for 12.-13.7.2011

Formality:–

Diplom

Students: 2 SWS

Credits (B.Sc./ M.Sc): 4 ECTS

Attendance list exists

Each participant will be session chair for one talk (moderation, discussion leader, min. 1 question concerning the talk)

Successfully attendance (Talk, Paper, Review)

Using department templates on our homepage

Language: English or German

Registration via Seminar homepage

http://www.net.in.tum.de/de/lehre/ss11/seminare/

Page 5: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

55

Appointments and Deadlines

Appointments

Topic selection 06.05.2011

Meeting with advisor as soon

as possible

Upload of paper (1st Version) and talk slides * 28.06.2011

TalksInvited

Guest

Talk: Dr. Achim Hof (Siemens AG)12./13.7.20119:00-18:00 Uhr

Uploads of reviews 11.07.2011

Upload of paper

(2nd Version) 31.07.2011

Publication

of Proceedings t.b.a.

* Slides must be presentable otherwise -0.3 degree in grading.

Slides can be modified after upload after consultation with advisor.

Page 6: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

6

Additional Support

See homepage: http://www.net.in.tum.de/de/lehre/ss11/seminare/

Slides:

Talk: How to write a scientific Paper?

Talk: How to write a Review?

Talk: How to give feedback?

Example:

Paper version 1 Review Paper version 2

Questions send to [email protected]

Advisors offer the opportunity of test talks!

Page 7: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

77

Grading

General things:

Paper structure (6-8 pages in ACM format)

1st Version for Peer-Review process

2nd Version (final) for publication in proceedings

Talk (20 min, following discussion, receiving feedback)

Content counts

Talking style is not counted

Review about papers from other seminar participants (minimum of 2)

Session chair for 1 talk

Please note:

Attendance is required at all appointments absence without permission results lower grades

Deadlines must be kept

Submission of your work through upload form on homepage

Papers must be self-written (no plagiarism)

Page 8: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

8

Page 9: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

99

Administration

Introduction to offered topics

Sensor Nodes

Network Topologies

Operating Systems

Middleware Concepts

Applications

Much more …

Topic selection

Page 10: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

1010

What‘s

going

on now?

For each

topic

An intoduction,

A motivation,

A little

more

detailed

view

into

topic,

And a detailed

assignment

of tasks

is

given.

Page 11: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

111111

Introduction

to Sensor Networks I -

different node

hardware

platforms

Platforms:–

Smart-Its

TinyOS

nodes

offered

by

Crossbow

(Mica, TelosB)

Scatterweb

Questions:–

What

is

a Wireless Sensor Network

(WSN)?

Characterization

of different technologies?

Short characterization

of an operating

system

(e.g. Contiki, TinyOS, Btnut, …)

Compare

the

different technologies:•

Hardware equipment

Wired

and Wireless Communication

Limited

factors

(energy, space, environment)

Possibilities

for

optimization

Areas

of application

Advisors: Baumgarten, Söllner

TelosB

Berliner Motte

Mica 2 Dot

Iris Mote

Vergeben

Page 12: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

121212

Introduction

to Sensor Networks II -

Sensor Types

and Bus protocols

General:–

Different sensor

types

on Hardware (light, motion, …)

Connected

to central

processing

Unit via different types

of connections

(digital, analogue)

Bus systems

have

different capabilities:

Noise

Achievable

Data rate

Number

of addressable

sensor

devices

Power consumption

Sensitivity

to Environmental

influence

(EMF)

Tasks:–

Describe

sensor

types

(what

do they

measure, in what

form do we

get

the

data, how

fast are

they

typically)

Describe

and compare

bus

systems

(criteria

above)

Recommend

bus

system

for

given

sensor

type

Advisors: Baumgarten, Söllner

TelosB

Berliner Motte

Mica 2 Dot

Iris Mote

Vergeben

Page 13: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

131313

Introduction

to Sensor Networks -

comparison

of operating

systems

Goal:

Introduction

of different operating

systems

Questions:–

What

is

a sensor

node

operating

system?

What

are

its

different characteristics?

Candidates:•

TinyOS

Contiki

MANTIS OS

Which

goals

are

important?•

Energy Consumption

Adaptation to different hardware

platforms

IT security

Documentation

available

API / Programming

Language

/ Compiler / Tool-Chain

Advisors: Baumgarten, Söllner

Topic can be split!

Page 14: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

1414

Data Acquisition

Techniques

to save resources

General:

Data acquisition

frequency

depends

on the

application

Medical

sensor

networks

Long time agricultural

measurements

Data acquisition

requires

power resources

Questions:

Why

is

does

data

acquisition

require

so much

power?

Which

protocols

and techniques

exist

to solve

the

problem?

Lakon: A Middle-ground Approach to High-frequency Data Acquisition and In-network Processing in Sensor Networks (IPSN 2010)

Adaptive data

collection

strategy

(EWSN 2010)

Advisor: Schmitt

Vergeben

Page 15: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

15

Data processing

techniques

Advisor: Schmitt

General:

Huch data

amount

is

collected.

Sensor data samples and especially their integrity are of

significance and

once acquired must not be lost.

Challenges:

data

must

arrive

ordered

sensors

are

often

calibrated,

sensor

network

deployments

and their

maintenance

are

labor-intensive

and expensive.

Questions:

Which

techniques

exist

to face the

challenges?

Reconstruction of the Correct Temporal Order of Sensor Network Data (IPSN 2011)

PermaDAQ: A scientific

instrument

for

precision

sensing

and data

recovery

in environmental

extremes (IPSN 2009)

What

development

exist?

Verified Data

Unfiltered Data

Rejectnon confirming

data

Model-based Testing and

Reconstuction

ApplicationDomain Filtering

Science

Page 16: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

1616

Security

in WSNs

-

Key Distribution and Management

General:

Security

levels

within

a WSN depend

on

Network

size

Application

Key Distribution and management

schemes

can

be

devided

into

groups:

Centralized

Key Schemes

Distributed

Key Schemes

Probalistic

Key Schemes

Questions:

Characterization

and comparison

of special

techniques

Attack

possibilities

Defence

strategies

Topic can be split !

Student thesis is offered !

Advisor: Schmitt, Söllner

Vergeben

Page 17: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

17

Security

in WSNs

-

Node

Replication

Attacks

General:

Depending on the application:

Hugh network size with hundreds of nodes

Exploiting without manual observation

With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network.

Such attacks may have severe consequences:

they may allow the adversary to corrupt network data or

even disconnect significant parts of the network

Questions:

What

is

a node

replication

attack

in detail?

What

detection

and defence

mechanisms

exist?

Advisor: Schmitt

Vergeben

Page 18: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

18

Watermarking

in Sensor Data Sets

General:

Sensor Data must be analysed

in context focus

Solution is watermarking techniques

Known

from

trade

market

such as bank

notes

Different techniques

exist

Techniques

offer

among

others

perceptibility, robustness

and capacity

Questions:

Characterize

and analyse

the

following

approaches

Self-identifying

sensor

data

(IPSN 20110)

Multiple watermarking

method

for

privacy

data

protection

in WSN (2011)

Selective Forwarding Attack Detection using Watermark in WSNs

(ISECS 2009)

An Authentication Method for Self Nodes Based on Watermarking in

Wireless Sensor Networks (2009)

Compare

the

approach

to traditional watermarking

strategies

Advisor: Schmitt

Topic can be split !

Page 19: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

19

Security

in WSNs

Denial

Of Service attacks

General:

Depending on the application:

Hugh network size with hundreds of nodes

Exploiting without manual observation

Different attacks on different layers

Questions:

What

attacks

are

possible

on a special

layer?

Which

consequences

occur?

How

can

the

attack

be

detected?

Which

defense

mechanisms

exist?

Advisor: Schmitt

Topic can be split!

Page 20: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

2020

Aggregation

in WSNs

General:

Resources must

be

saved

Most energy

is

consumed

during

data

transmission

Data Aggregation

Different approaches:•

Cluster-based

Aggregation

Tree-based

(hierarchical) Aggregation

Single Aggregator

Algorithms

Questions:

Why

is

data

aggregation

a solution

for

the

problem?

Which

challenges

occur?

Characterization

and comparison

of different approaches

Advisor: Schmitt

max(17°,22°)

max(31°,22°)

max(31°,26°)

max(18°,26°)

22°

31°

26°

26°

18° 26° 17° 22°

31°

Aggregator

Topic can be split!

Page 21: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

21

Resource-Management-Tools

for

WSNs

General:

Resources must

be

saved

Most energy

is

consumed

during

data

transmission

Management-Tool

Different approaches:

Tiny

Network

Manager(TNM) (2010)

Peloton

(2009)

Collective

Intelligence

(2009)

Questions:

What

are

the

challenges

during

the

development

of a management-tool

that

must

be

faced?

Characterization

and comparision

of different tools

Advisor: Schmitt 21

Page 22: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

22

TLS solutions

for

WSNs

General:

Security is very important

Common solution is TLS in “normal P2P networks”

Is it a solution for WSN?

Questions:

Why

is

a TLS solution

interesting

for

WSNs?

Introduce, analyse

and compare

the

following

approaches

Securing Communications between Multiple Entities Using a Single

TLS Session

(NTMS 2011)

Adapting TLS Handshake Protocol for Heterogenous

IP-Based WSN using Identity Based Cryptography (ICWUS 2010)

Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks (ESAS 2006)

What

are

the

challanges

and what

must

be

faced

in the

future?

Advisor: Schmitt

Page 23: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

23

Neighbor

Discovery Strategies

in WSNs

General:

Networks are usually deployed randomly over the region

Process

to identify

a set

of nodes

with

which

a node

can

communicate

Process

must

run

without any a priori knowledge

Questions:

What

challanges

occur

during

neighbor

discovery

process?

Characterize, analyse

and compare

different approaches:

Multipacket

Reception Capability and Physical-Layer Signal Processing (2010)

An asynchronous neighbor discovery algorithm for wireless sensor

networks (2007)

Birthday

protocols

for

low

energy

deployment

and flexible neighbor

discovery

in ad hoc wireless

networks

(MobiHOC 2001)

Neighbor Discovery in Wireless Ad Hoc Networks Based on Group Testing (2008)

Neighbor discovery in wireless networks and the coupon collector’s problem (MobiCOM 2009)

HelloHello

After n steps

Advisor: Schmitt

Page 24: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

2424

Simulation Tools

24

Tossim

Evaluation:

Packet Loss

End-to-End Delay

Jitter

Energy Consumption

Network Lifetime

Application

Signal Propagation

Mobility

Topic:

Introduction and comparison of

OPNET, Avrora

and Tossim

Network Performance

Power Consumption

Advisor: Klein

Page 25: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

2525

Energy Consumption

of Sensor Components

Optimizing

Sensor Measurements

and Communication

Advisor: Schmitt, Söllner

Goal:

present

and describe

strategies

of sensor

node

hard-

and software

to minimize

power consumption

for

a given

task

(i.e. humidity

measurement).

Example

strategies

to describe:

Interrupt

driven

measurement

Dynamic

adaption

of sleep

periods

Data aggregation

within

the

network

Burst

transmission

of data

Dynamic

transceiver

power usage

Analoge versus

digital hardware

BA/MA Thesis available:

Energy Consumption in Wireless Sensor Networks (Advisor: Klein)

Topic can be split!

Vergeben

Page 26: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

26

Reprogramming

Techniques

for

WSNs

General:

Depending on the application field the manual human input is not

possible (e.g. agricultural, building monitoring) Reprogramming “on the fly”

Changing values (e.g. measurement intervals) according to the requirements

Questions:

What

challanges

can

occur

by

reprogramming

sensor

nodes? (e.g. node

is

lost)

What

techniques

exist? Characterize

and compare

them

Selective

Reprogramming

in Sensor Networks (NTMS 2011)

Trickle

(NSDI 2004)

Melete

(SenSys 2006)

Deluge

(SenSys 2004)

Zephyr (USENIX 2009)

Using

Compression

of Executable

Modules

(SECON 2008)

MOAP (2003)

MNP (2005)

Advisor: Schmitt

Topic can be split!

Page 27: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

27

Event Detection

in WSNs

Vehical

Tracking

General:

Sensor Data must be analysed

in context focus

Tracking becomes more and more important

Offers also features for grouping

Application field: Vehical

Tracking

Questions:

Why

is

event

detection

important?

Characterize

and analyse

the

following

approaches

VigilNet

(2005)

SensIT

Project (2004)

Compare

the

approaches?

Where

are

the

challanges

and problems?

Advisor: Schmitt, Söllner

Source: Lightweight detection and classification for wireless sensor networks in realistic environments

Vergeben

Page 28: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

28

WSN Application

Neonatal

Monitoring

General:

Upcoming application area is health monitoring

Important: Hippocratic Oath Save Life

“Small”

WSN technology is interesting for “small”

bodys Neonatal Medicine

Important: correct data transmission, detection and display

Questions:

Why

are

WSNs

so interesting

for

neonatal

medicine?

Introduce, analyse

and compare

the

following

approaches

Design of Wireless Sensor System for Neonatal Monitoring (NTMS 2011)

Wireless Transmission Design for Health Monitoring at Neonatal Intensive Care Units (ISABEL 2009)

What

are

the

challanges

and what

must

be

faced

in the

future?

Advisor: Schmitt

Page 29: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

2929

WSN Application

Cell

Phone as Sensor Node

General:

More and more Smartphone among users

Smartphones

have increased internet

connection capabilities (“always on”)

Different sensor types on hardware

ambient light, gravity, acceleration, gps

Different data to be derived from that

Questions:

Aquiring

data: progress

versus

privacy?

Is

aquired

data

without

user

information

useful

at all for

the

industry?

Todays

applications

(mainly

google

/ microsoft

products)?

Advisor: Söllner

Vergeben

Page 30: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

303030

Tasks:

Introduction and description of different MAC protocols (LPL, X-

MAC, BPS-MAC)

Comparison of the protocols with CSMA / TDMA based protocols in terms of:

Interference

Utilization/Overhead

Packet Loss/Delay

Energy Efficiency

Fairness

MAC –

Comparison

of preamble-based

MAC protocols

Advisor: Alexander Klein – http://www.net.in.tum.de/de/mitarbeiter/klein/

BA/MA 2 x Theses available:

• Quality of Service Medium Access Control Protocols for Wireless Sensor Networks

• Simulative Performance Comparison of preamble-based MAC protocols

Medium Access Control

Vergeben

Page 31: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

3131

Introduction to Sensor Networks –

Dependencies between Protocol Design and used Hardware

General:

Different network topologies

Different applications

Different hardware resources

special protocol design is needed

Questions:

What is a Wireless Sensor Network?

What is characteristic for the hardware?

Which requirements for the operating system exist?

How works a protocol stack?

Why should be energy efficient networks be developed?

Advisor: Schmitt

Vergeben

Page 32: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

323232

Acustic

Communication (UWNs)

Goal: Introduction

and characterisation

of the

communication

workflow

in an

underwater

application.

Questions:

Which

technologies

exist?

Hardware (ultrasonic, infrasonic)

Technologies of modulation

Fault tolerance

Characterization

of Communication

Data rate

Range

Latency

Characterization

of Applications

Military Approaches

(„SOSUS“)

Civil Approaches

(Tsunami

Warning)

Advisors: Baumgarten, Söllner

Vergeben

Page 33: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

3333

Tasks:

Description of the RPL protocol

Identification of performance limitation factors

Comparison with other routing protocols

Overhead

Routing metric

Packet loss

Delay

Complexity

Mobility

Routing -

RPL: IPv6 Routing Protocol for Low power and Lossy

Networks

Advisor: Alexander Klein – http://www.net.in.tum.de/de/mitarbeiter/klein/

BA/MA Thesis available:

Performance Evaluation of RPL in Wireless Sensor Networks

Vergeben

Page 34: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

3434

TCP/IP communication

in a WSN

General:

TCP/IP are

well known

protocols

Important

topics

for

analysis

are

Flow

control

Addressing

Packet fragmentation

are

adapted

in a gateway

that

relays

Questions:

How

is

TCP/IP adapted

to WSNs?

Which

challenges

must

be

faced?

Characterisation

of the

workflow

(e.g. appllication

multimedia

WSN)

How

important

is

link quality

and how

can

it

be

estimated?

Advisor: Schmitt

Vergeben

Page 35: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

3535

Tasks:

Short introduction to Tiny OS

Description of the CTP protocol including the LEEP algorithm

Comparison with other routing protocols

Overhead

Routing metric

Packet loss

Delay

Complexity

Routing

-

Collection

Tree

Protocol

(CTP)

Advisor: Alexander Klein – http://www.net.in.tum.de/de/mitarbeiter/klein/

BA/MA Thesis available:

Simulative Performance Evaluation of the Collection Tree Protocol (CTP)

Vergeben

Page 36: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

3636

Tasks:

Discussion of necessity and challenges of IP communication in WSNs

Introduction and description of different IP stacks (μIP / BLIP)

Comparison of the IP stacks•

Memory

Reliability

Overhead

IP-based

Communication

in Wireless Sensor Network

Advisor: Alexander Klein – http://www.net.in.tum.de/de/mitarbeiter/klein/

BA/MA Thesis available:

IP-based Communication in Wireless Sensor Network

Vergeben

Page 37: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

37

Page 38: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

3838

Administration

Intoduction

to offered

topics

Topic selection

Page 39: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

3939

Topic Selection

(I)

Author Title Advisor

Andreas Heider Introduction to Sensor Networks –

Dependencies between Protocol Design and used Hardware

Schmitt

Andrè

Freitag Data Acquisition

Techniques

to save resources

Schmitt

More

topics

possible

Sebastian Bendeich

Security

in WSNs

-Key Distribution and Management

Random

Key Distribution Schemes

in WSNs

-

Comparison

of different probalistic

approaches

Schmitt, Söllner

Schmitt

Dominik Weber Introduction

to Sensor Networks II –

Sensor Types

and Bus ProtocolsSöllner

Dominik Wetzel Intorduction

to Sensor Networks I

-

Different node

hardware

platforms

Söllner

Page 40: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

4040

Topic Selection

(II)

Author Title Advisor

Johannes Ziegltrum Energy Consumption of Sensor Components -

Optimizing Sensor Measurements and Communication

Söllner, Schmitt

Resource-Management-Tools

for

WSNs Schmitt

Tsvetko

Tsvetkov Routing -

RPL: IPv6 Routing Protocol for Low power and Lossy

NetworksKlein

Christian Dietz Routing

-

Collection

Tree

Protocol

(CTP) Klein

Christian Fuchs IP-based

Communication

in Wireless Sensor Network

Klein

Markus Grimm Acustic

Communication

(UWNs) Söllner

Joseph Wessner MAC –

Comparison

of preamble-based

MAC protocolsKlein

Page 41: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

4141

Topic Selection

(III)

Author Title Advisor

Data processing

techniques Schmitt

Johannes Schlicker Security in WSNs

-

Node Replication Attacks

Schmitt

Security in WSNs

Denial Of Service attacks

Schmitt

Simulation Tools Klein

Oliver Gasser TCP/IP communication

in a WSN Schmitt

TLS solutions

for

WSNs Schmitt

Aggregation

in WSNs Schmitt

Michael Stuber Event Detection

in WSNs

Vehical

TrackingSchmitt, Söllner

Page 42: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

42

Topic Selection

(IV)

Author Title Advisor

WSN Application

Neonatal

Monitoring Schmitt

Reprogramming

Techniques

for

WSNs Schmitt

Neighbor

Discovery Strategies

in WSNs Schmitt

Michael Schmitt WSN Application

Cell

Phone as Sensor Node

Söllner

Watermarking

in Sensor Data Sets Schmitt

Markus Dauberschmidt

More

topics

possible

Introduction

to Sensor Networks -

Comparison

of Operating

SystemsBaumgarten, Söllner

Page 43: Information Session for the Master-Seminar Sensor Nodes ... · Securing Communications between Multiple Entities Using a Single TLS Session (NTMS 2011) • Adapting TLS Handshake

43