This workshop is a (mandatory!) part of the Network Security lecture held in the winter term 2015/2016. Subject of the workshop are all topics covered in the first chapter "Physical- & Link-Layer Security":
The workshop is organized in a typical computer science research conference manner. It consists of three phases:
After the third phase, we will take the best essays (according to their ratings) and publish them on the lecture's website in form of a workshop proceedings. As already mentioned in the lecture, the successful participation in this workshop (including all three phases) is mandatory and a formal prerequisit to the exam. Successful participation means that the final rating of your essay must be at least 0 (on a Likert scale).
Note: These deadlines are hard deadlines! Missing them results in an immediate exclusion from the workshop and loss of admission. So make sure you are well-organized.
|Group registration:||Friday, 11.12.2015 (23:59)|
|Essay submission:||Friday, 15.01.2016 (23:59)|
|Reviews:||Friday, 29.01.2016 (23:59)|
|Final version:||Tuesday, 09.02.2016 (23:59)|
In order to be accepted for the review process, your essay must strictly conform with the following regulations. Violations will result in exclusion from the workshop and thus, exclusion from the NetSec exam. So please read the following carefully and make sure your essay will comply with these submission guidelines.
After you've submitted your essay, it's time to start the review phase of the PhyLiSec workshop. Therefore, you have been added to the so called "Program Committee" on Easychair and Carolina has assigned two essays to all of you. If you have no account on EasyChair yet, use the email address your group mate entered in your submission. The reviews will be double-blind. That means, neither you know who you are reviewing, nor the other authors will know who reviewed them.
For each of your two assigned essays, you have to write a short review. Start with reading the essays carefully and then fill in this text template for each essay. Each section in the review (summary/strengths/weaknesses/feedback) should have at least 100 words. Be concise and provide arguments for your statements. The reviews will serve as a basis for improvements in the revision phase and all reviewers should keep this in mind. Finally, rate the essay between very bad (-2) and very good (2).
Plagiarism: In case you learn that the essay you are reviewing is a case of plagiarism, we recommend to reject the paper by rating it with -2. In such a case, please provide proof for your allegation by referencing the respective parts of the essay. Examples for plagiarism (which have already been found) would be if the essay is almost completely copied from other works.
The deadline for the review submission is at 23:59 on the 29th of January. You can find the essays assigned to you under "Reviews->My papers" on Easychair. To submit a review, click on the green "+"-Button and enter your review into the form.
As mentioned in the notification email, those of you who are not rejected need to revise their essay according to the comments in the reviews until the 9th of February at 23:59. You can upload your revised essay on EasyChair. To do so, please change your role back to author (PhyLiSec16->Change Role).
The final versions of the papers are listed below. They are supposed to serve as an additional source for information for the exam preparation. Thanks everyone for participating and producing these valuable resources. The five best essays (according to the reviews) are marked with ★. Congratulations!
|J01||Peter Brucker, Marco Meides, Nils Sievers||A Short Introduction to Jamming|
|J02||Aleem Sarwar, Dipesh Dangol, Sameed Munir||On the Efficiency of Jammers|
|J03||Shashank H. Kedlaya, Nagashree Natesh, Anusha Halsnad||On the Efficiency of Jammers|
|J10||Markus Fögen, Eric Jedermann, Roman Kowalew||On the Efficiency of Jammers|
|J04||Jahanzeb Khan, Fahim Mahmood Mir, Syed Moiz Hasan||Reactive Jamming: Challenges and State of the Art|
|J05||Manish Kumar, Pramod Gopal Hegde, Prajakta Pathak||Reactive Jamming: Challenges and State of the Art|
|J06||Patrick Helber, Fabian Hering, Markus Urschel||Challenges of Jamming Detection|
|J07||Johannes Korz, Tim Krakow, Patrick Pfenning||Challenges of Jamming Detection|
|J08||Andre Backes, David Christian, Phil Stuepfert||Jamming Mitigation Techniques|
|J09||Nikolay Grechanov||Jamming Mitigation Techniques ★★★★|
|W01||Ranjith K B, Amit R Desai, Devina Vyas||An Introduction to Security in IEEE 802.11|
|W02||Jan Albert, Kira Kraft, Matthias Thomas||An Introduction to Security In IEEE 802.11 ★★★★★|
|W03||Johannes Aubart, Simon Nilius||Crypto Failures: The Case of WEP|
|W04||Hemad Sefati, Kiran Mathews||Crypto Failures: The Case of WEP|
|W05||Corvin Kuebler, Mario Keuler, Oliver Petter||Attacks on IEEE 802.11: A Summary|
|W06||Waleed Bin Khalid, Zaryab Iftekhar, Max Stein||Attacks on IEEE 802.11: A Summary|
|W07||Aniket Mohapatra,Vishwanath Chiniwar, Siavash Mohebbi||Attacks on IEEE 802.11: A Summary|
|C01||Willy Loedts, Jan Fiete Schütte, Valentin Doll||An Overview of Security Measures in Cellular Networks (GSM/3G/LTE)|
|C02||Alexander Scheffler, Tobias Renner, Xavier Hofmann||Attacks on GSM and LTE Networks ★★★★|
|C03||Paulo Aragao, Tenzin Chozom, Tewanima Löwe||Security Measures in Cellular Networks ★★★|
Air Trafic Surveillance
|A01||Alex Kerber, Alexandra Rau||Security of ADS-B: Attack Scenarios|
|A02||Patrick Blaß, Sebastian Wüst||Security of ADS-B: Attack Scenarios ★★★★★|
|A03||Johannes Müller, Florian Blandfort||Security of ADS-B: Attack Scenarios|
Location & Track Verification
|L01||Ahsan Naeem, Claudio José Castaldello Busatto, Gilson Souza||Methods for Secure Location Verification: An Overview|
|L02||Eid Muhammad, Khurshid Alam||Methods for Secure Location Verification: An Overview|
|L03||Paul Fröhling, Tulasi Seelamkurthi||Relay Attacks: The Case of PKES|
|L04||John Cristian Borges Gamboa, Ram Kumar Ganesan||How To Defeat Relay Attacks?|
|L05||Michael Emde, Fabian Neffgen, Martine Schaack||Secure Track Verification: How to Secure Air Traffic Surveillance?|
|L06||Clemens Vögele, Dennis Reski, Elrike van den Heuvel||Secure Track Verification: How to Secure Air Traffic Surveillance?|