No results match your search criteria.
Reset filter
2021
Completed
Security Analysis of Neighbor Awareness Networking-capable Wi-Fi Firmware using Fuzzing
Supervisor:
Lars Almon
2020
Completed
Delay-Tolerant LoRaWAN with mobile Gateways and SatCom Backhaul
Supervisor:
Lars Almon
2020
Completed
LoRa for Smart Street Lamps
Supervisor:
Lars Almon
2019
Completed
Creating an indoor simulation tool witha realistic antenna model for an IEEE 802.11ad 60 GHz devices
Supervisor:
Allyson Sim
Lars Almon
2019
Completed
Security Analysis of LoRaWAN: An Experimental Evaluation of Attacks
Supervisor:
Lars Almon
Flor Maria Alvarez Zurita
Read the thesis
Low-power wide-area networks (LPWAN) are becoming the wireless backbone for modern business processes and municipal administration. LoRaWAN, which stands for long-range wide-area network, is a recent medium access control (MAC) layer protocol competing for this market. It stands out by its open operator model and a novel modulation technique. With LoRaWAN and other communication technologies are becoming a dependency for more and more aspects of today's society, the question for their security and reliability comes up. Previous researches on the topic have already revealed vulnerabilities in the first LoRaWAN specification, which have been partly mitigated in the most recent LoRaWAN 1.1. However, related studies often provide only theoretical results or consider practical scenarios only on a specific, small scale. In this thesis, we present a LoRaWAN security evaluation framework that allows field-testing the security and reliability characteristics of actual LoRaWAN deployments. This provides not only reproducible results but also allows making a comparison between defined versions of the specification and LoRaWAN software. Before expounding implementation details, we provide a literature survey on LoRaWAN vulnerabilities and attacks to identify interesting aspects for further evaluation. From our experimental results, we show that jamming is a serious threat to the availability of LoRaWAN networks. Furthermore, we demonstrate the practical applicability of two replay attacks against a selection of LoRaWAN software and illustrate why they will remain relevant for years due to backward compatibility.
2019
Completed
Security Evaluation of LoRaWAN Network Servers using Fuzzing
Supervisor:
Lars Almon
Low Power Wide Area Network (LPWAN) technologies like Long Range Wide Area Network (LoRaWAN) are used for creating low maintenance sensor networks in many scenarios. The central part of a LoRaWAN is the Network Server (NS). Previous security research often focused on conceptual security issues in the protocol, this work evaluates fuzzing, the security testing using semi-valid random messages, as a technique to find vulnerabilities in NSs. We investigate the situation of practical network deployments and software in use. Then we derive an approach for a general fuzzing framework for NSs. We present our fuzzer implementation in detail and describe experiments we conducted with an example network server. The results show that this network server was susceptible to a denial of service attack. We therefore conclude that fuzzing is an appropriate tool for making LoRaWANs more secure by uncovering vulnerabilities in NSs.
2019
Completed
Bluetooth Mesh Network Security Analysis: An Experimental Evaluation of Attacks Using Btlejack
Supervisor:
Flor Maria Alvarez Zurita
Lars Almon
2019
Completed
Intercom Security
Supervisor:
Lars Almon
Jiska Classen
Intercom security analysis.
2019
Completed
Practical Evaluation of LoRa in Multihop Networks
Supervisor:
Lars Almon
Practical Evaluation of LoRa in Multihop Networks
2019
Completed
Implementation of a Linux User-space Neighbor Awareness Networking Protocol Stack
Supervisor:
Lars Almon
Implementation of a Linux User-space Neighbor Awareness Networking Protocol Stack
2019
Completed
Practical Performance Analysis of Neighbor Awareness Networking
Supervisor:
Lars Almon
Milan Stute
2018
Completed
Combining WiFi, Bluetooth and BLE: Limitations and synergy effects of using Google Nearby Connections 2.0
Supervisor:
Lars Almon
Now most of the smartphones are equipped with different wireless interfaces namely Wi-Fi, Bluetooth, BLE, Ad-hoc Wi-Fi, and NFC. These different interfaces have different weaknesses and strengths. Bluetooth is suited for low bandwidth and short-range communication. Bluetooth Low Energy(BLE) on the other hand is aimed at devices which have limited power supply and need to transfer data in short intervals. Wi-Fi is well suited for high bandwidth, low-latency communication with increased ranges. By utilizing the combination of these interfaces, we can enhance the performance of offline peer-to-peer connectivity. The number of devices using the Internet is growing at a rapid rate, creating traffic congestion especially by using multimedia services. we can offload and distribute this traffic using high performance peer-to-peer connectivity. With the growing need of Infrastructureless network in the remote or disaster-stricken area, better device-to-device communication could prove to be life-saving. Nearby Connections 2.0 is the new offline peer-to-peer, high bandwidth low latency API from Google. It uses a combination of Wi-Fi Direct, BLE and Bluetooth to create reliable and fast connections. In this thesis, we evaluate Nearby Connections against all three interfaces it uses. We execute 4 experiments with different network parameters to analyze the limitations and benefits of using Nearby Connections. By varying different parameters we maximize the performance of each interface to observe the behavior of Nearby Connections. Our evaluation results indicate that this is in fact not the case with Nearby Connections. It does not adjust itself to get the best out of underlying interfaces. We show the limitations of Nearby Connections API. However, it performed better than both Bluetooth and BLE but against Wi-Fi Direct it performed way below the par.
2018
Completed
Processing and evaluation of the smarter field test about delay-tolerant networks in the event of an disaster
Supervisor:
Lars Almon
This thesis is about the processing and evaluation of the data generated by the Smartphone-based Communication Networks for Emergency Response (smarter) project. The smarter project is a research project that investigates the use of Delay Tolerant Networks (DTNs) as a method of communication for the civil population during a disaster situation. During this thesis the recorded data is transferred into a format readable by the simulator The Opportunistic Network Environment Simulator (The ONE), so that the field experiment can be repeated as often as required. This makes it possible to easily compare the data with that of other projects or to combine it with data genera ted by the simulator. The thesis also highlights some difficulties that may occure during the analysis and execution of field experiments.