Contents

This workshop is a (mandatory!) part of the Network Security lecture held in the winter term 2018/2019. Subject of the workshop are all topics covered in the first chapter "Physical- & Link-Layer Security":

  • Jamming: Attacks, Detection, Mitigation
  • WiFi (IEEE 802.11): Problems, Attacks, State-of-the-art
  • Cellular networks: GSM, LTE
  • Cyber-physical Systems: PKES, ADS-B
  • Countermeasures: Secure Location Verification, Distance Bounding

Organisation

The workshop is organised in a typical computer science research conference manner. It consists of three phases:

  1. Submission phase: Students submit their contributions (here: in form of essays) to the conference. Each essay must be written in a group of three students. Therefore, you need to find two peers for your group. In case you do not know any other attendees, you will have the opportunity to find a group in the lecture. Please read the submission guidelines (below) carefully!
  2. Review phase: After the submission deadline below has passed, all submissions will be reviewed and rated by members of the program committee. For this workshop, the program committee consists of all authors, that is, you. This means, that you have to read, comment, and rate three essays from other students. The submission and reviewing process is double-blind, which means that neither the authors know the reviewers, nor do the reviewers know the authors.
  3. Revision phase: Once the deadline for reviews has passed, we hand out the (anonymous) reviews to the authors of the essays. The authors will then have to revise their essay based on the comments of the reviewers. After processing the reviews and updating the essays, the groups have to re-submit their works and the reviewers have to adjust their ratings.

After the third phase, we will take the best essays (according to their ratings) and publish them on the lecture's website in form of a workshop proceedings. As already mentioned in the lecture, the successful participation in this workshop (including all three phases) is mandatory and a formal prerequisite to the exam. Successful participation means that the final rating of your essay must be at least 0 (on a Likert scale).

Deadlines

Note: These deadlines are hard deadlines! Missing them results in an immediate exclusion from the workshop and loss of admission. So make sure you are well-organised.

Group registration: Tuesday, 04.12.2018 (23:59)
Essay submission: Friday, 04.01.2019 (23:59)
Reviews: Friday, 18.01.2019 (23:59)
Final version: Sunday, 03.02.2019 (23:59)

Submission Guidelines

In order to be accepted for the review process, your essay must strictly conform with the following regulations. Violations will result in exclusion from the workshop and thus, exclusion from the NetSec exam. So please read the following instructions carefully and make sure your essay complies with the submission guidelines.

  • The number of authors is limited to at most three authors per essay. We prefer groups of three, however, smaller groups are possible under special circumstances. Organisation of group members and group-internal division of work is at your own responsibility. If you do not find any group mates, ask This email address is being protected from spambots. You need JavaScript enabled to view it. or during the lecture.
  • The essays will be reviewed in double-blind mode. They must be submitted in a form suitable for anonymous review: no author names may appear on the title page, and papers should avoid revealing their identity in the text. Contact the program chair This email address is being protected from spambots. You need JavaScript enabled to view it. if you have any questions. Papers that are not properly anonymised may be rejected without review. Please note that only the essay itself, not the registration at easychair (see below) must be anonymised. Since students from other groups may be your reviewer in the review process, it is strongly recommended not to reveal your topic other groups or students outside the lecture to obtain unbiased reviews.
  • The length of the essay must be at least 2 pages per author and at least 3 pages in total. So if you plan to write your essay alone, you will have to write more. Your essay should consist of at least 66% text. That means that figures and tables combined should not occupy more than 1/3rd of the available space.
  • Essays must be written using the LaTeX markup language. Knowing LaTeX is a key skill in the academic world. If you are not familiar with LaTeX yet, there is plenty of documentation and examples available online. As common for international research conferences, essays must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 inches tall and 3.5 inches wide. The text must be in Times font, 10-point, with 11-point or 12-point line spacing. Authors are strongly encouraged to use the IEEE conference proceedings templates. Its default settings when using \documentclass[10pt, conference, letterpaper]{IEEEtran} are accepted.
  • Submissions must be in Portable Document Format (.pdf). Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers. Your document should render correctly in Adobe Reader 9 and when printed in black and white.
  • We expect every student to use at least 2 references. Use the bibliography of the NetSec slides (last set of slides) or search engines like Google Scholar to find literature on your topic. That means, if you are writing your essay in a group of three students, your essay should list at least 6 references. Use e.g. BibTeX for referencing.
  • Plagiarism in any form is unacceptable and is considered a serious breach of professional conduct. If you refer to information from other sources directly or indirectly, indicate the original source carefully using references. We will use plagiarism detection tools, so make sure you do not copy without referencing the source. For referencing and bibliography examples, please check e.g. the papers referenced in the NetSec lecture. It is again strongly recommended to use the IEEE bibliography style as shown here. This style is common for computer science papers.
  • Essays must be submitted at https://easychair.org/conferences/?conf=phylisec18 and may be updated at any time until the submission deadline (see above). On registration, EasyChair requires you to enter your home address. If you feel uncomfortable with providing your data to EasyChair (although it is a reputable platform), just use the address of TU Kaiserslautern instead of your private one.
  • Fairness: In case one of your group mates does not deliver her/his part of the essay, do not hesitate to omit the name when registering the essay on the submission platform. To keep this exercise fair, you do not have to do the work for lazy group mates.  Work should be evenly distributed to all group members. For instance, if only two of the three group members are actually doing the work, enter only these two names on EasyChair. Also the required number of pages is then reduced accordingly to 4 (or 3 if only one is doing all the work).

Review Guidelines

After you've successfully submitted your essay, it's time to start the review phase of the PhyLiSec workshop. Therefore, you will be added to the so called "Program Committee" on Easychair and Yasmina will assign two essays to each of you. If you have no EasyChair account yet, make sure you register using the email address your group mate entered in your submission. The reviews will be double-blind. This means that neither you know who you are reviewing, nor the other authors will know who reviewed them.

Start with reading the essays assigned to you carefully and then fill in the review form in EasyChair for each essay. You will find the essays assigned to you under "Reviews->Assigned to me". To submit a review, click on the "+"-Button and enter your review into the form. Each section in the review (summary/strengths/weaknesses) should have around 100 words. Be concise and provide arguments for your statements. The reviews will serve as a basis for improvements in the revision phase and all reviewers should keep this in mind. Finally, rate the essay between very bad (-2) and very good (2). Based on this final rating, we will decide whether you'll have to improve your essay in the revision phase or not in order to pass this workshop.

Plagiarism: In case you learn that the essay you are reviewing is a case of plagiarism, we recommend to reject the paper by rating it with -2. In such a case, please provide proof for your allegation by referencing the respective parts of the essay. Examples for plagiarism would be if the essay is almost completely copied from other works.

Misc: If you have any additional comments you would like us to know (but not the authors), use the comments field in the submission form.

The deadline for the review submission is at 23:59 on the 18th of January.

Revision & Final Version

As mentioned in the notification email, those of you who have not achieved an average rating above or equal to 0.5 need to revise their essays. You can upload your revised essay on EasyChair. To do so, please change your role back to author (PhyLiSec16->Change Role).

In addition, everybody needs to upload a final version of the essay which includes the names of all authors.

Proceedings

The final versions of the papers are listed below. They are supposed to serve as an additional source for information for the exam preparation. Thanks everyone for participating and producing these great essays. The three best essays (according to the reviews) are marked with . Congratulations!

ID Author(s) Title Link
Jamming
J01 Lucia Eve Berger, Selina Heller, Kamolchanok Tangsri Reactive Jamming: Challenges and State of the Art PDF
J02 Mark Emmert Jamming Attacks and Defense Strategies PDF
J03 Ricardo Stadtlober Sabedra, Rubens Ideron dos Santos, Bruno Catellan On the Efficacy of Jammers PDF
J04 Sebastian Igel, Sebastian Maurice Kohler Reactive Jamming: Challenges and State of the Art PDF
J05 Anuj Maharjan, Vikas Rajasheker, Mala Mahadevu A Short Introduction to Jamming PDF
IEEE 802.11
W01 Hagen Heermann, Janik Westers, Kevin Bartik Attacks on IEEE 802.11: A Summary PDF
W02 Roman Krafft, Marcel Wölki Comparison of Security in WEP, WPA and WPA2 PDF
W03 Rouven Heyne Attacks on IEEE 802.11: A Summary PDF
W04 Maurice Hipp, Bjarne Janson An Introduction to Security in IEEE 802.11 PDF
Cellular Networks
M01 Fehemi Lecini, Giovanni Capone Security Measures in Cellular Networks: How good are they? PDF
M02 Deepak Paramashivam, Yash Rohilla Security Measures in Cellular Networks: How good are they? PDF
M03 Nicolas Belliard, Mohammadali Forouzesh, Bogdan Alin Muresan Attacks on GSM and LTE Networks PDF
M04 Jean-François Nies, Samir Bouchama Attacks on GSM and LTE Networks PDF
Air Trafic Surveillance
A01 Eric Kinner, Dominik Kratz, Marco Stricker Security of ADS-B: Attack Scenarios PDF
A02 Lisa Busser, Sviatlana Shukailava, Frederik Stegner How to fix ADS-B PDF
A03 Patrick Hansert, Michele Klein, Christopher Queling How to fix ADS-B Security PDF
A04 Martin Reber, Tim Aries How to fix ADS-B Security PDF
A05 Tillmann Angeli, Marc Kraft, Paul Paulsen Privacy and ADS-B PDF
A06 Kayvan Faghih Mirzaei, Bruno Pessanha de Carvalho, Patrick Pschorn Security of ADS-B: Attack Scenarios★★★ PDF
A07 Jan Schnurpfeil, Anna Kleiner Privacy and ADS-B★★ PDF
Global Positioning System
G01 Gabriel Alexandre Zillmer, Praveen Annamalai Nathan, Somesh Gireesan Pillai (In)Security Of GPS: How to Fix The Lack of Security of GPS? PDF
G02 Martin Böh, Joshua Koch, Johannes Roob (In)security of GPS: How to fix the lack of security of GPS? PDF
G03 Steffen Lauer, Jonas Elsler, Alwin Zaft (In)security of GPS: How to fix the lack of security of GPS? PDF
Location & Track Verification
L01 Jephte Abijuru, Oliver Berg Security by Mobility: How does mobility improve security in location-aware networks? PDF
L02 Khakim Akhunov, Taimoor Bin Khalid, Anja Hamscher How To Defeat Relay Attacks? PDF
L03 Sophie Kadel, Leonie Stetter, Mischa Helfenstein Angle vs. Time vs. Strength vs. Mobility: Pros and Cons of different features for location verification PDF
L04 Michael Kessler, Michael Weinberg, Shun-Jie Yan Security by Mobility: How does mobility improve security in location-aware networks? PDF
L05 Arthur Just, Fabian Coenen, Jonas Henrich Angle vs. Time vs. Strength vs. Mobility: Pros and Cons of different features for location verification PDF
L06 Philipp Horn, Stephane Ngambo, Jennifer Haessel Methods for secure Location Verification: An overview PDF

University of Kaiserslautern

Write your thesis with a disco advisor

We offer a variety of bachelor and master theses at any point in the academic year. Also check out some of our completed theses. Read more...

Go to top