course: Bachelor Practical Wireless Physical Layer Security

number:
142025
teaching methods:
practical course
media:
overhead transparencies, computer based presentation
responsible person:
Prof. Dr.-Ing. Chris­tof Paar
lecturer:
Dr.-Ing. Christian Zenger (ETIT)
language:
german
HWS:
3
CP:
3
offered in:
winter term and summer term

dates in winter term

  • kick-off meeting: Wednesday the 16.10.2019 from 16:00 in ID 04/445
  • lab Wednesdays: from 16:00 to 18.00 o'clock in ID 04/445

dates in summer term

  • start: Wednesday the 10.04.2019 from 16:00 in ID 04/445
  • lab Wednesdays: from 16:00 to 18.00 o'clock in ID 04/445

Exam

Form of exam:lab
Registration for exam:Directly with the lecturer
continual assessment

goals

This practical training basically consists of three different learning goals: First the participants learn about Software Defined Radio (SDR) architecture and their programming via “Gnu Radio”. Second the usage of SDRs as well as knowledge about different wireless standards and potential attacks using SDRs. Third the implementation and evaluation of modern wireless-channel based security architecture. Python will be used as the programming language. Furthermore, participants will learn about group work, project and time management.

content

During this practical training, two topics will be dealt with. The participants will learn about the fundamentals of Software Defined Radios (SDRs). After the first project, students will already be able to develop passive listening attacks with GNU Radio for the RTL-SDR architecture. During the following projects participants will deepen their knowledge on RTL-SDR and wireless standards. They will develop more and more complex programs during the course. The second part of the course the students will learn about wireless-based security architecture, such as channel-based key generation and fingerprinting. The students will be separated in groups of up to three people, using a kit of Raspberry Pis, wireless modules, a preconfigured operating system and various other utilities. Every group will implement a given channel-based security architecture in Python and will need to evaluate it under realistic terms.

requirements

Grundkenntnisse Kryptographie, z.B. aus dem Modul Einführung in die Kryptographie und Datensicherheit

recommended knowledge

Basic knowledge of cryptography, e.g. from the module Introduction to Cryptography. Basic programming knowledge (Python)

miscellaneous

No Spot reservation via email. Every detail will be announced at the briefing.