This workshop is a (mandatory!) part of the Network Security lecture held in the winter term 2018/2019. Subject of the workshop are all topics covered in the first chapter "Physical- & Link-Layer Security":
The workshop is organised in a typical computer science research conference manner. It consists of three phases:
After the third phase, we will take the best essays (according to their ratings) and publish them on the lecture's website in form of a workshop proceedings. As already mentioned in the lecture, the successful participation in this workshop (including all three phases) is mandatory and a formal prerequisite to the exam. Successful participation means that the final rating of your essay must be at least 0 (on a Likert scale).
Note: These deadlines are hard deadlines! Missing them results in an immediate exclusion from the workshop and loss of admission. So make sure you are well-organised.
|Reviews:||Friday, 18.01.2019 (23:59)|
|Final version:||Sunday, 03.02.2019 (23:59)|
In order to be accepted for the review process, your essay must strictly conform with the following regulations. Violations will result in exclusion from the workshop and thus, exclusion from the NetSec exam. So please read the following instructions carefully and make sure your essay complies with the submission guidelines.
After you've successfully submitted your essay, it's time to start the review phase of the PhyLiSec workshop. Therefore, you will be added to the so called "Program Committee" on Easychair and Yasmina will assign two essays to each of you. If you have no EasyChair account yet, make sure you register using the email address your group mate entered in your submission. The reviews will be double-blind. This means that neither you know who you are reviewing, nor the other authors will know who reviewed them.
Start with reading the essays assigned to you carefully and then fill in the review form in EasyChair for each essay. You will find the essays assigned to you under "Reviews->Assigned to me". To submit a review, click on the "+"-Button and enter your review into the form. Each section in the review (summary/strengths/weaknesses) should have around 100 words. Be concise and provide arguments for your statements. The reviews will serve as a basis for improvements in the revision phase and all reviewers should keep this in mind. Finally, rate the essay between very bad (-2) and very good (2). Based on this final rating, we will decide whether you'll have to improve your essay in the revision phase or not in order to pass this workshop.
Plagiarism: In case you learn that the essay you are reviewing is a case of plagiarism, we recommend to reject the paper by rating it with -2. In such a case, please provide proof for your allegation by referencing the respective parts of the essay. Examples for plagiarism would be if the essay is almost completely copied from other works.
Misc: If you have any additional comments you would like us to know (but not the authors), use the comments field in the submission form.
The deadline for the review submission is at 23:59 on the 18th of January.
As mentioned in the notification email, those of you who have not achieved an average rating above or equal to 0.5 need to revise their essays. You can upload your revised essay on EasyChair. To do so, please change your role back to author (PhyLiSec16->Change Role).
In addition, everybody needs to upload a final version of the essay which includes the names of all authors.
The final versions of the papers are listed below. They are supposed to serve as an additional source for information for the exam preparation. Thanks everyone for participating and producing these great essays. The three best essays (according to the reviews) are marked with ★. Congratulations!
|J01||Lucia Eve Berger, Selina Heller, Kamolchanok Tangsri||Reactive Jamming: Challenges and State of the Art|
|J02||Mark Emmert||Jamming Attacks and Defense Strategies|
|J03||Ricardo Stadtlober Sabedra, Rubens Ideron dos Santos, Bruno Catellan||On the Efficacy of Jammers|
|J04||Sebastian Igel, Sebastian Maurice Kohler||Reactive Jamming: Challenges and State of the Art|
|J05||Anuj Maharjan, Vikas Rajasheker, Mala Mahadevu||A Short Introduction to Jamming|
|W01||Hagen Heermann, Janik Westers, Kevin Bartik||Attacks on IEEE 802.11: A Summary|
|W02||Roman Krafft, Marcel Wölki||Comparison of Security in WEP, WPA and WPA2|
|W03||Rouven Heyne||Attacks on IEEE 802.11: A Summary|
|W04||Maurice Hipp, Bjarne Janson||An Introduction to Security in IEEE 802.11|
|M01||Fehemi Lecini, Giovanni Capone||Security Measures in Cellular Networks: How good are they?|
|M02||Deepak Paramashivam, Yash Rohilla||Security Measures in Cellular Networks: How good are they?|
|M03||Nicolas Belliard, Mohammadali Forouzesh, Bogdan Alin Muresan||Attacks on GSM and LTE Networks|
|M04||Jean-François Nies, Samir Bouchama||Attacks on GSM and LTE Networks|
Air Trafic Surveillance
|A01||Eric Kinner, Dominik Kratz, Marco Stricker||Security of ADS-B: Attack Scenarios★|
|A02||Lisa Busser, Sviatlana Shukailava, Frederik Stegner||How to fix ADS-B|
|A03||Patrick Hansert, Michele Klein, Christopher Queling||How to fix ADS-B Security|
|A04||Martin Reber, Tim Aries||How to fix ADS-B Security|
|A05||Tillmann Angeli, Marc Kraft, Paul Paulsen||Privacy and ADS-B|
|A06||Kayvan Faghih Mirzaei, Bruno Pessanha de Carvalho, Patrick Pschorn||Security of ADS-B: Attack Scenarios★★★|
|A07||Jan Schnurpfeil, Anna Kleiner||Privacy and ADS-B★★|
Global Positioning System
|G01||Gabriel Alexandre Zillmer, Praveen Annamalai Nathan, Somesh Gireesan Pillai||(In)Security Of GPS: How to Fix The Lack of Security of GPS?|
|G02||Martin Böh, Joshua Koch, Johannes Roob||(In)security of GPS: How to fix the lack of security of GPS?|
|G03||Steffen Lauer, Jonas Elsler, Alwin Zaft||(In)security of GPS: How to fix the lack of security of GPS?|
Location & Track Verification
|L01||Jephte Abijuru, Oliver Berg||Security by Mobility: How does mobility improve security in location-aware networks?|
|L02||Khakim Akhunov, Taimoor Bin Khalid, Anja Hamscher||How To Defeat Relay Attacks?|
|L03||Sophie Kadel, Leonie Stetter, Mischa Helfenstein||Angle vs. Time vs. Strength vs. Mobility: Pros and Cons of different features for location verification|
|L04||Michael Kessler, Michael Weinberg, Shun-Jie Yan||Security by Mobility: How does mobility improve security in location-aware networks?|
|L05||Arthur Just, Fabian Coenen, Jonas Henrich||Angle vs. Time vs. Strength vs. Mobility: Pros and Cons of different features for location verification|
|L06||Philipp Horn, Stephane Ngambo, Jennifer Haessel||Methods for secure Location Verification: An overview|