1. »
  2. Wireless Security Group
  3. »
  4. Lehre
  5. »
  6. Abschlussarbeiten
  7. »
  8. Pas­si­ve­ly spy­ing on your neigh­bor’s mo­bi­le be­ha­vi­or – LTE Traf­fic Ana­ly­sis

Pas­si­ve­ly spy­ing on your neigh­bor’s mo­bi­le be­ha­vi­or – LTE Traf­fic Ana­ly­sis

All­ge­mein

Be­treu­er: David Rupp­recht
Be­ginn: as soon as pos­si­ble
Dauer: 6 months

Wei­te­re De­tails: [1] [2] [3] [4] [5]

Be­schrei­bung

Long Term Evo­lu­ti­on (LTE) is the most re­cent ge­ne­ra­ti­on of mo­bi­le com­mu­ni­ca­ti­on tech­no­lo­gies and pro­mi­ses en­han­ced se­cu­ri­ty fea­tures. Howe­ver, re­cent work shows that the user’s pri­va­cy can be un­der­mined by using radio layer in­for­ma­ti­on to lo­ca­te a victim [1], which im­po­ses a se­rious thre­at to user’s pri­va­cy in mo­bi­le net­works. This can be ac­com­plis­hed by tech­ni­ques such as traf­fic ana­ly­sis, which uses en­cryp­ted or un­en­cryp­ted met­a­da­ta to leak sen­si­ti­ve in­for­ma­ti­on about the user be­ha­vi­or. Traf­fic ana­ly­sis al­lows the iden­ti­fi­ca­ti­on of cha­rac­te­ris­tic pat­terns even in en­cryp­ted and pad­ded data streams, the­re­fo­re an ad­versa­ry is able to, e.g., dis­tin­gu­ish bet­ween dif­fe­rent ap­p­li­ca­ti­ons just given the in­for­ma­ti­on leak of trans­mit­ted pa­ckets [2,3].

The stu­dent’s task is to eva­lua­te the fe­a­si­bi­li­ty of traf­fic ana­ly­sis based on LTE sche­du­ling in­for­ma­ti­on. For that the stu­dent should im­ple­ment an ana­ly­sis tool for LTE using srsL­TE [4] or Open­AirIn­ter­face [5], that re­cei­ves and de­codes down­link as well as uplink in­for­ma­ti­on. Given this in­for­ma­ti­on, it should be ana­ly­zed how that in­for­ma­ti­on can be used to iden­ti­fy ap­p­li­ca­ti­ons wi­t­hin a con­nec­tion. Good C and C++ pro­gramming skills are re­qui­red; know­ledge about si­gnal pro­ces­sing and Soft­ware De­fined Radio (SDR) is pre­fe­ra­ble.

Vor­aus­set­zun­gen