Security Analysis of LoRaWAN: An Experimental Evaluation of Attacks
Bluetooth Mesh Network Security Analysis: An Experimental Evaluation of Attacks Using Btlejack
Secure Device Pairing Using Short-Range Acoustic Communication
Reverse Engineering the Apple Wireless Direct Link Protocol
Apple Wireless Direct Link (AWDL) is a proprietary and undocumented 802.11 based peer-to-peer protocol. It is implemented in all of Apple’s operating systems. In this thesis a reverse engineering method using binary analysis complemented by runtime analysis with traces and logs was applied. We found that each device in AWDL provides its own channel sequence. An elected master node is used to synchronize these sequences. Outside these windows of time, devices can use their wireless radio for other protocols or save energy by turning it off. Each node adapts its channel sequence, e.g. depending on network load, shifting the ratio between infrastructure and peer-to-peer Wi-Fi. This thesis also provides a first analysis of AWDL, includes the frame format documentation and presents a Wireshark dissector and a prototype implementation for AWDL.
A Framework for Adaptive Energy-efficient Neighbour Discovery in Oppertunistic Networks
Secure key exchange protocol for a group communication during emergency responses