1. Home
  2. /
  3. Wireless Security Group
  4. /
  5. Lehre
  6. /
  7. Abschlussarbeiten
  8. /
  9. Lo­ca­ti­on Hiding Pro­per­ties

Lo­ca­ti­on Hiding Pro­per­ties


Be­treu­er: Ka­tha­ri­na Kohls
Be­ginn: as soon as pos­si­ble
Dauer: 6 months

Wei­te­re De­tails:


An­ony­mi­ty sys­tems are de­si­gned to se­pa­ra­te the end­points of a con­nec­tion, e.g., the user on one side of the net­work and the ac­ces­sed ser­ver on the other side of the net­work. In this con­text, it can be chal­len­ging to suc­cess­ful­ly de­li­ver mes­sa­ges to the cor­rect re­ci­pi­ent, as the di­rect ad­dres­sing of a com­mu­ni­ca­ti­on part­ner might re­veal their whe­re­abouts. While this might be ac­cep­ta­ble for less sen­si­ti­ve use cases, it can lead to se­ve­re se­cu­ri­ty is­su­es for, e.g., cen­sorship cir­cum­ven­ti­on or whist­le blowing. Howe­ver, exis­ting work in the con­text of an­ony­mi­ty sys­tem often tar­gets traf­fic ana­ly­sis or rou­ting at­tacks that make use of trans­mis­si­on cha­rac­te­ris­tics, but only li­mi­ted work was pro­po­sed on cha­rac­te­ris­tics that con­ce­al or pro­tect the lo­ca­ti­on pro­per­ties of a net­work.

The stu­dent’s task is to first de­fi­ne the cha­rac­te­ris­tics of a lo­ca­ti­on hiding pro­per­ty and then to apply this to exis­ting con­cepts of an­ony­mi­ty sys­tems. The goal of this work is to get a bet­ter un­der­stan­ding of the tech­ni­cal cha­rac­te­ris­tics of de­ploy­ed and theo­re­ti­cal sys­tem con­cepts with a focus on their ad­dres­sing con­cept.


  • Pro­gramming skills
  • In­te­rest in An­ony­mi­ty Sys­tems