This workshop is a (mandatory!) part of the Network Security lecture held in the winter term 2015/2016. Subject of the workshop are all topics covered in the first chapter "Physical- & Link-Layer Security":

  • Jamming: Attacks, Detection, Mitigation
  • WiFi (IEEE 802.11): Problems, Attacks, State-of-the-art
  • Cellular networks: GSM, LTE
  • Cyber-physical Systems: PKES, ADS-B
  • Countermeasures: Secure Location Verification, Distance Bounding


The workshop is organized in a typical computer science research conference manner. It consists of three phases:

  1. Submission phase: Students submit their contributions (here: in form of essays) to the conference. Each essay must be written in a group of three students. Therefore, you need to find two peers for your group. In case you do not know any other attendees, you will have the opportunity to find a group in the lecture. Please read the submission guidlines (below) carefully!
  2. Review phase: After the submission deadline (TBA) has passed, all submissions will be reviewed and rates by members of the program committee. For this workshop, the program committee consists of all authors, i.e. you. That means, that you have to read, comment, and rate three essays from other students. The submission and reviewing process is double-blind, which means that neither the authors know the reviewers, nor do the reviewers know the authors.
  3. Revision phase: Once the deadline for reviews has passed, we hand out the (anonymous) reviews to the authors of the essays. The authors will then have to revise their essay based on the comments of the reviewers. After processing the reviews and updating the essays, the groups have to re-submit their works and the reviewers have to adjust their ratings.

After the third phase, we will take the best essays (according to their ratings) and publish them on the lecture's website in form of a workshop proceedings. As already mentioned in the lecture, the successful participation in this workshop (including all three phases) is mandatory and a formal prerequisit to the exam. Successful participation means that the final rating of your essay must be at least 0 (on a Likert scale).


Note: These deadlines are hard deadlines! Missing them results in an immediate exclusion from the workshop and loss of admission. So make sure you are well-organized.

 Group registration:        Friday, 11.12.2015 (23:59)
 Essay submission: Friday, 15.01.2016 (23:59)
 Reviews: Friday, 29.01.2016 (23:59)
 Final version: Tuesday, 09.02.2016 (23:59)

Submission Guidelines

In order to be accepted for the review process, your essay must strictly conform with the following regulations. Violations will result in exclusion from the workshop and thus, exclusion from the NetSec exam. So please read the following carefully and make sure your essay will comply with these submission guidelines.

  • The number of authors is limited to at most three authors per essay. Organization of group members and group-internal division of work is at your own responsibility.
  • The essays will be reviewed in double-blind mode. They must be submitted in a form suitable for anonymous review: no author names may appear on the title page, and papers should avoid revealing their identity in the text. Contact the program chair This email address is being protected from spambots. You need JavaScript enabled to view it. if you have any questions. Papers that are not properly anonymized may be rejected without review. Please note that only the essay itself, not the registration at easychair (see below) must be anonymized. Since students from other groups may be your reviewer in the review process, it is strongly recommended not to reveal your topic other groups or students outside the lecture to obtain unbiased reviews.
  • The length of the essay must be at least 2 pages per author and at least 3 pages in total. So if you plan to write your essay alone, you will have to write more.
  • Essays must be written using the LaTeX markup language. Knowing LaTeX is a key skill in the academic world. If you are not familiar with LaTeX yet, there is plenty of documentation and examples available online. As common for international research conferences, essays must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in. tall and 3.5 in. wide. The text must be in Times font, 10-point, with 11-point or 12-point line spacing. Authors are strongly encouraged to use the IEEE conference proceedings templates. Its default settings when using \documentclass[10pt, conference, letterpaper]{IEEEtran} are accepted.
  • Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.
  • We expect every student to use at least 2 references. Use the bibliography of the NetSec slides (last set of slides) or search engines like Google Scholar to find literature on your topic. That means, if you are writing your essay in a group of three students, your essay should list at least 6 references. Use e.g. BibTeX for referencing.
  • Plagiarism in any form is unacceptable and is considered a serious breach of professional conduct. If you refer to information from other sources directly or indirectly, indicate the original source carefully using references. We will use plagiarism detection tools, so make sure you do not copy without referencing the source. For referencing and bibliography examples, please check e.g. the papers referenced in the NetSec lecture. It is again strongly recommended to use the IEEE bibliography style as shown here. This style is common for computer science papers.
  • Essays must be submitted at and may be updated at any time until the submission deadline (see above). On registration, EasyChair requires you to enter your address. If you feel uncomfortable with providing your data to EasyChair (although it is a reputable platform), please do not hesitate entering e.g. the address of the TU Kaiserslautern instead of your private one.
  • Fairness: In case one of your group mates does not deliver her/his part of the essay, do not hesitate to omit the name when registering the essay on the submission platform. To keep this exercise fair, you do not have to do the work for lazy group mates.  Work should be evenly distributed to all group members. For instance, if only two of the three group members are actually doing the work, enter only these two names on EasyChair. Also the required number of pages is then reduced accordingly to 4 (or 3 if only one is doing all the work).

Review Guidelines

After you've submitted your essay, it's time to start the review phase of the PhyLiSec workshop. Therefore, you have been added to the so called "Program Committee" on Easychair and Carolina has assigned two essays to all of you. If you have no account on EasyChair yet, use the email address your group mate entered in your submission. The reviews will be double-blind. That means, neither you know who you are reviewing, nor the other authors will know who reviewed them.

For each of your two assigned essays, you have to write a short review. Start with reading the essays carefully and then fill in this text template for each essay. Each section in the review (summary/strengths/weaknesses/feedback) should have at least 100 words. Be concise and provide arguments for your statements. The reviews will serve as a basis for improvements in the revision phase and all reviewers should keep this in mind. Finally, rate the essay between very bad (-2) and very good (2).

Plagiarism: In case you learn that the essay you are reviewing is a case of plagiarism, we recommend to reject the paper by rating it with -2. In such a case, please provide proof for your allegation by referencing the respective parts of the essay. Examples for plagiarism (which have already been found) would be if the essay is almost completely copied from other works.

The deadline for the review submission is at 23:59 on the 29th of January. You can find the essays assigned to you under "Reviews->My papers" on Easychair. To submit a review, click on the green "+"-Button and enter your review into the form.

Final Version

As mentioned in the notification email, those of you who are not rejected need to revise their essay according to the comments in the reviews until the 9th of February at 23:59. You can upload your revised essay on EasyChair. To do so, please change your role back to author (PhyLiSec16->Change Role).


The final versions of the papers are listed below. They are supposed to serve as an additional source for information for the exam preparation. Thanks everyone for participating and producing these valuable resources. The five best essays (according to the reviews) are marked with . Congratulations!

 ID Author(s) Title Link
J01 Peter Brucker, Marco Meides, Nils Sievers A Short Introduction to Jamming PDF
J02 Aleem Sarwar, Dipesh Dangol, Sameed Munir On the Efficiency of Jammers PDF
J03 Shashank H. Kedlaya, Nagashree Natesh, Anusha Halsnad On the Efficiency of Jammers PDF
J10 Markus Fögen, Eric Jedermann,  Roman Kowalew On the Efficiency of Jammers PDF
J04 Jahanzeb Khan, Fahim Mahmood Mir, Syed Moiz Hasan Reactive Jamming: Challenges and State of the Art PDF
J05 Manish Kumar, Pramod Gopal Hegde, Prajakta Pathak Reactive Jamming: Challenges and State of the Art PDF
J06 Patrick Helber, Fabian Hering, Markus Urschel Challenges of Jamming Detection PDF
J07 Johannes Korz, Tim Krakow, Patrick Pfenning Challenges of Jamming Detection PDF
J08 Andre Backes, David Christian, Phil Stuepfert Jamming Mitigation Techniques PDF
J09 Nikolay Grechanov Jamming Mitigation Techniques ★★★ PDF
IEEE 802.11  
W01 Ranjith K B, Amit R Desai, Devina Vyas An Introduction to Security in IEEE 802.11 PDF
W02 Jan Albert, Kira Kraft, Matthias Thomas An Introduction to Security In IEEE 802.11 ★★★★★ PDF
W03 Johannes Aubart, Simon Nilius Crypto Failures: The Case of WEP PDF
W04 Hemad Sefati, Kiran Mathews Crypto Failures: The Case of WEP PDF
W05 Corvin Kuebler, Mario Keuler, Oliver Petter Attacks on IEEE 802.11: A Summary PDF
W06 Waleed Bin Khalid, Zaryab Iftekhar, Max Stein Attacks on IEEE 802.11: A Summary PDF
W07 Aniket Mohapatra,Vishwanath Chiniwar, Siavash Mohebbi Attacks on IEEE 802.11: A Summary PDF
Cellular Networks  
C01 Willy Loedts, Jan Fiete Schütte, Valentin Doll An Overview of Security Measures in Cellular Networks (GSM/3G/LTE) PDF
C02 Alexander Scheffler, Tobias Renner, Xavier Hofmann Attacks on GSM and LTE Networks ★★ PDF
C03 Paulo Aragao, Tenzin Chozom, Tewanima Löwe Security Measures in Cellular Networks PDF
Air Trafic Surveillance  
A01 Alex Kerber, Alexandra Rau Security of ADS-B: Attack Scenarios PDF
A02 Patrick Blaß,  Sebastian Wüst Security of ADS-B: Attack Scenarios ★★★★ PDF
A03 Johannes Müller, Florian Blandfort Security of ADS-B: Attack Scenarios PDF
Location & Track Verification  
L01 Ahsan Naeem, Claudio José Castaldello Busatto, Gilson Souza Methods for Secure Location Verification: An Overview PDF
L02 Eid Muhammad, Khurshid Alam Methods for Secure Location Verification: An Overview PDF
L03 Paul Fröhling, Tulasi Seelamkurthi Relay Attacks: The Case of PKES PDF
L04 John Cristian Borges Gamboa, Ram Kumar Ganesan How To Defeat Relay Attacks? PDF
L05 Michael Emde, Fabian Neffgen, Martine Schaack Secure Track Verification: How to Secure Air Traffic Surveillance? PDF
L06 Clemens Vögele,  Dennis Reski,  Elrike van den Heuvel Secure Track Verification: How to Secure Air Traffic Surveillance? PDF
Go to top