The following demonstrations will be held at the NetSys 2015. All demos compete for the Communication Software Award, which honors the best practice-oriented application, tool, framework, or demonstration showing innovative and original research in the areas of networks, communication, and distributed systems. The demos are separated into a (Master) Student’s category and a regular demonstrations category.

Master Student Demonstrations

The following demonstrations compete in the (Master) Student’s category of the Communication Software Award.

  • PDFA Browser-based Secure P2P Framework for Decentralized Online Social NetworksOnline social networks figured out to be the main tool to communicate in the Internet. While current centralized solutions suffer from censorship, privacy violations and unwanted marketing of the users data, decentralized solutions, e.g. based on p2p technology, promise to overcome these limitations. The downside of p2p solutions is the need to install additional software, which is nowadays not accepted by users which are used to web-based applications. With WebRTC, standard browsers can communicate directly, which allows to construct secure p2p overlays. We present our WebRTC-based p2p framework with a social network application on top, which uses a heavily modified version of OpenChord to provide a decentralized public key infrastructure, secure communication patterns and a set of building blocks to create a social network. Our prototype application proved its efficiency in a real world scenario and can now be reached via
    Andreas Disterhöft (University of Düsseldorf), Kalman Graffi (University of Düsseldorf)
  • PDFAn Android Framework for Opportunistic Wireless Mesh NetworkingSmartphones are more and more widespread in the society. They are powerful devices with huge storage space and high bandwidth communication capabilities. However, several use cases cannot be supported nowadays, especially when it comes to the exchange of large files between geographically close participants. Currently, smartphones only communicate through services in the Internet or through Bluetooth, both are limited in their bandwidth and scale. The exchange of large files of hundreds of MB between dozens of users is very time consuming and thus nearly impossible. We present an Android Framework and Application Toolkit for wireless, opportunistic mesh networking in combination with a peer-to-peer-based data management functionality. The smartphones create the wireless opportunistic mesh network without user interaction and negotiate the files to exchange, the nodes to contact and the transmission schedule. Thus, huge files can be exchanged through (multi-hop) wireless local communication between dozens of smartphones. This we demonstrate with several devices and also invite the participants to join the demonstration with their Android devices.
    Andre Ippisch (University of Düsseldorf), Kalman Graffi (University of Düsseldorf)
  • PDFJSXC: Adding Encrypted Chat with 3 Lines of CodeIf it isn’t on the web, it doesn’t exist. However, most of our current arsenal of web services is provided for free by large international corporations – free as in targeted advertising. More privacy-aware self-hosted alternatives frequently lack the feature set of their commercial rivals, leaving users to decide between privacy and functionality. Therefore, we present WISEchat (Web-Integrated Secure Enhanced Chat), our concept for enhancing practical security for web-based chat, as well as an implementation, the JavaScript XMPP Client (JSXC). By design, JSXC can be easily and painlessly integrated into existing webapps to equip them with encrypted chat capabilities, making them more attractive and thus more frequently providing a secure alternative as the most functional and convenient alternative.
    Klaus Herberth (University of Konstanz), Daniel Scharon (University of Konstanz), Matthias Fratz (University of Konstanz), Marcel Waldvogel (University of Konstanz)
  • PDFUnveiling SSHCure 3.0: Flow-based SSH Compromise DetectionNetwork-based intrusion detection systems have always been designed to report on the presence of attacks. Due to the sheer and ever-increasing number of attacks on the Internet, Computer Security Incident Response Teams (CSIRTs) are overwhelmed with attack reports. For that reason, there is a need for the detection of compromises rather than compromise attempts, since those incidents are the ones that have to be taken care of. In previous works, we have demonstrated and validated our state-of-the-art compromise detection algorithm that works on exported flow data, i.e, data exported using NetFlow or IPFIX. The detection algorithm has been implemented as part of our open-source intrusion detection system SSHCure.
    In this demonstration, we showcase the latest release of SSHCure, which includes many new features, such as an overhauled user interface design based on user surveys, integration with incident reporting tools, blacklist integration and IPv6 support. Attendees will be able to explore SSHCure in a semi-live fashion by means of practical examples of situations that CSIRT members encounter in their daily activities.

    Rick Hofstede (University of Twente), Luuk Hendriks (University of Twente)
    ⇒  1st Place Master Student Demonstrations at the Communications Softward Awards

Regular Demonstrations

The following demonstrations compete in the regular category of the Communication Software Award.

  • PDFA Game Engine based 3D-Simulation to Support RFID Locating in Consideration of Mobile Objects in a Radio FieldThe ROSI-3D research project aims to improve locating objects in dynamic environments significantly from a technical and economic perspective, by joining new approaches from RF engineering and computer science. Utilizing game engines for simulation purposes takes economic considerations into account by combining an optimized workflow with a highly extendable software framework.
    Benjamin Hatscher (University of Applied Sciences Magdeburg), Michael A. Herzog (University of Applied Sciences Magdeburg), Olaf Friedewald (University of Applied Sciences Magdeburg)
  • PDFA Multicast-Avoiding Privacy Extension for the Avahi Zeroconf DaemonIn today’s local networks, a significant amount of traffic is caused by Multicast packets, such as Multicast DNS Service Discovery (mDNS-SD), a widespread technique used for configurationless service distribution and discovery. It suffers from two major problems inherent in multicast: privacy and network load. We present a privacy extension for the Avahi Zeroconf Daemon that tackles both problems while being very efficient.
    Daniel Kaiser (University of Konstanz), Andreas Rain (University of Konstanz), Marcel Waldvogel (University of Konstanz), Holger Strittmatter (University of Konstanz)
  • PDFA Multi-Platform Library for a Software Sender for the (proposed) ILDA Digital NetworkThis software demonstration presents work of the Laser and Light Lab at the Institute of Computer Science 4 of the University of Bonn on proposed standardization work of the International Laser Display Association (ILDA, [2]). The Laser and Light Lab (as a nonprofit ILDA member) got involved into a proof-of-concept implementation of a software-based sending side of the (proposed) IDN – ILDA Digital Network, implementing this as a multi-platform (Linux, Windows) library that can be attached to existing laser show control software.
    The demonstration presents a setup with professional/commercial laser show software, as well as software coming from own student/research projects, both supplemented with our software library for IDN. The demonstration will highlight two modes of operation of IDN and will focus on illustrating conceptual differences of both modes with a discussion of pros and cons.

    Matthias Frank (University of Bonn)
    ⇒  1st Place Regular Demonstrations at the Communications Softward Awards
  • PDFA Passive Source Localization System for IEEE 802.15.4 SignalIn this work, we provide a passive location monitoring system for IEEE 802.15.4 signal emitters. The system adopts software defined radio techniques to passively overhear IEEE 802.15.4 packets and to extract power information from baseband signals. In our system, we provide a new model based on the nonlinear regression for ranging. After obtaining distance information, a Weighted Centroid (WC) algorithm is adopted to locate users. In WC, each weight is inversely proportional to the nth power of propagation distance, and the degree n is obtained from some initial measurements. We evaluate our system in a 16m∗18m area with complex indoor propagation conditions. We are able to achieve a median error of 2.1m with only 4 anchor nodes.
    Zan Li (University of Bern), Torsten Braun (University of Bern)
  • PDFBoost DNS Privacy, Reliability, and Efficiency with opDNS Safe Query EliminationSRV records, DNSSEC, and DANE among others fortify the Domain Name System as the central information hub behind the Internet. Largely hidden from the end user, an increasing number of protocol and trust decisions are contingent on DNS. Neglect or attacks on DNS have much more impact today than ever, now endangering security far beyond denial of service. Opportunistic Persistent DNS (opDNS) addresses these problems by abandoning pessimistic caching and eliminating unnecessary traffic. Today’s DNS infrastructure relies on the hosts forgetting and refreshing DNS records in relatively short time. In conjunction with TLS, opDNS greatly reduces the number of queries and in turn increases privacy, reliability, and efficiency. Even with DNS lookups all but eliminated for frequently visited secure services, changes to the server addresses will be recognized almost immediately, unlike standard DNS. We will show how end systems can take advantage of opDNS without having to wait for support by server operators or application developers, enabling the most effective way of deployment.
    Marcel Waldvogel (University of Konstanz), Thomas Zink (University of Konstanz)
  • PDFDemonstration of NetworkCoverage – A Mobile Network Performance Measurement AppOptimizing the Quality of Experience (QoE) of mobile applications over cellular networks requires detailed knowledge of the underlying network and it’s performance. Parameters of interest are, besides the signal strength and availability of technologies, the Round-trip Time (RTT) and available throughput of individual cells at a given location. This information is generally not readily available. Therefore, an Android application measuring the cellular network performance was developed. This demonstration shows the NetworkCoverage App, being implemented to provide visual feedback of the measured network quality to the users, and sample the cellular network in an efficient manner to later support traffic scheduling improvements based on reliable data.
    Fabian Kaup (TU Darmstadt), Florian Jomrich (TU Darmstadt), David Hausheer (TU Darmstadt)
  • PDFEchoRing - Meeting Hard Real-Time Constraints with Decentralized Wireless NetworksGiven the rising demand for wireless solutions in the area of machine-to-machine communication, we present the novel EchoRing protocol. It is designed to serve the communication needs of industrial applications, while being optimized for the wireless channel specifically. Directly taking known principles of tethered communication to the wireless domain is likely to yield degraded performance results. Additional techniques have to be added to make known principles be able to master the challenges of wireless channel dynamics. On the other hand, the majority of currently existing wireless communication standards are developed to allow mobility on the last hop of a transmission path that originates in the Internet or a local home network. Hence, the focus is on supporting the best-effort paradigm of the data streams. However, in industrial environments this best-effort paradigm gets replaced by the need to steadily achieve very high reliabilities at very short deadlines.
    In this demonstration, we will show how industrial applications can be interconnected wirelessly despite the drawbacks of the wireless channel. The experimental setup allows to compare different medium access control protocols under varying conditions.

    Christian Dombrowski (RWTH Aachen University), James Gross (KTH Royal Institute of Technology)
    ⇒  2nd Place Regular Demonstrations at the Communications Softward Awards
  • PDFEfficient Video Streaming through Seamless Transitions between Unicast and BroadcastThis work describes the prototype of the DFG Collaborative Research Center 1053 on ’Multi Mechanism Adaptation for the Future Internet’ (MAKI) on switching between network mechanisms during runtime. The replacement of whole network mechanisms of a system is called a transition. Transitions are necessary when environmental conditions change significantly. In this demonstration we show the advantages of transitions for a live video streaming. Starting from a client/server based delivery the live video streaming system is proposed which seamlessly adapts to a P2P-based delivery, when the number of concurrent clients significantly increases. As P2P-based unicast-based delivery is inefficient when concurrent accesses come from the same geographic spot, the transition to local dissemination of the live video is investigated. The system identifies a local client which relays the live stream via broadcast to interested local clients. Both the transition from client/server to P2P as well as the replacement of IP Unicast with Broadcast is executed seamlessly for the video player.
    Stefan Wilk (TU Darmstadt), Julius Rückert (TU Darmstadt), Denny Stohr (TU Darmstadt), Björn Richerzhagen (TU Darmstadt), Wolfgang Effelsberg (TU Darmstadt)
    ⇒  3rd Place Regular Demonstrations at the Communications Softward Awards
  • PDFEnabling Physical Interaction with Virtualized Testbeds for Hands-on Networking CoursesHands-on networking courses are an important part in IT education and provide students practical qualification for their later jobs. We present a networking lab testbed that makes use of virtualization while still enabling the course participants to physically interact with cables and devices.
    Mark Schmidt (University of Tuebingen), Florian Heimgaertner (University of Tuebingen), Michael Hoefling (University of Tuebingen), Michael Menth (University of Tuebingen)
  • PDFImplementation of RF-based Gesture Interaction on an Android PhoneVarious approaches exist to detect gestures and movements via smartphones. The absence of reliable ad-hoc on-line gesture detection from environmental sources inspired this project for on-line hand gesture detection on a smartphone using only WiFi RSSI. We highlight our line of work and explain problems at hand to provide information for possible future work. We will furthermore introduce pcan_showcase, a smartphone application that is able to detect movement in front of the smartphone by reading the WiFi RSSI and use this information to control a Slideshow.
    Christoph Rauterberg (Georg-August-University Göttingen), Mathias Velten (Georg-August-University Göttingen), Stephan Sigg (Georg-August-University Göttingen), Xiaoming Fu (Georg-August-University Göttingen)
  • PDFImproving Network Security in Virtualized Environments with OpenFlowMany of the classical techniques by which the network security can be increased in physical networks do not work or can be used only with great effort in virtualized environments. Thus, it is not possible to physically separate virtual machines on a host system from each other in order to filter their communication through a firewall. Although attacks on the layers 2 and 3, such as ARP spoofing and rogue DHCP servers, can be easily controlled by appropriate switches in physical networks, equivalent methods are not used in virtual networks. In this demo, we present an approach using OpenFlow and a special OpenFlow controller to increase the network security in virtual systems. Without changes to the guest systems, ARP and DHCP attacks as well as their IPv6 counterparts can be effectively prevented.
    Rene Rietz (BTU Cottbus-Senftenberg), Andreas Brinner (genua mbH), Radoslaw Cwalinski (BTU Cottbus-Senftenberg)
  • PDFIntroduction to the Topology Management Tool - A Live DemonstrationThe Topology Management Tool (ToMaTo) is a topology-oriented networking testbed for fully virtual networking experiments using virtual machines and virtual networking topologies. This demonstration will show the basic usage and some additional features of ToMaTo.
    Dennis Schwerdel (University of Kaiserslautern), Paul Müller (University of Kaiserslautern)
  • PDFModeling Management Functions as Link Layer ApplicationsFuture wireless communication systems have to address a number of challenges including the massive growth of traffic volume, number of connected devices and a wide range of new applications and operating conditions. Therefore, adaptability and extensibility at all layers of a communication system is of great importance in order to meet the desired goals. In this demonstration, we showcase a prototype of a novel link layer architecture that employs a component-based design to separate data transfer and management related functions in order support a wide range of applications. Specifically, we demonstrate a dynamic spectrum access network exploiting available radio spectrum opportunities while ensuring primary user protection. The spectrum mobility functionality is realized as an optional management application on top of a generic data transfer protocol.
    Andre Puschmann (Ilmenau University of Technology), Andreas Mitschele-Thiel (Ilmenau University of Technology)
  • PDFStealth Apps for Secure Personal Data Analytics in the CloudPersonal Data Analytics (PDA), also called Body Informatics, is a new computing trend driven by the ubiquitous presence of sensing mobile devices and cloud services. Participating persons collect body, health, sports and activity metrics and submit them to analytics portals with incentives such as training progress metering, social comparison and gamification. The uncontrolled cloudification of personal data makes the affected persons vulnerable to tracking, tapping and loss of valuable records. Stealth applications present an alternative software architecture paradigm which mitigates many of the risks. A distributed stealth platform, partially under the control of the user, enables analytics over encrypted and dispersed data in untrusted public cloud environments. In this demo, we showcase a secure public cloud stealth database and an e-sports application running on it.
    Josef Spillner (TU Dresden), Lorenzo Miori (Free University of Bozen-Bolzano), Julian Sanin (Free University of Bozen-Bolzano)
  • PDFWebMaDa: Web-based Mobile Access and Data Handling Framework for Wireless Sensor NetworksUsers request comfortable frameworks not only to configure and manage their wireless sensor networks (WSNs) but also to monitor them independent of the user’s location. CoMaDa is a framework supporting the aforementioned two requirements but does not allow monitoring from outside the network using the Internet. Thus, the Web-based Mobile Access and Data Handling (WebMaDa) framework supports those mobility requirements and, therefore, incorporates online database storage, access control management, and visualization with responsive design for different screen sizes of mobile devices (e.g., smartphones, tablets). WebMaDa is as flexible and hardware independent as CoMaDa and additionally allows the user to monitor WSNs on mobile devices if they are the owner or have the corresponding rights.
    Corinna Schmitt (University of Zürich), Michael Keller (University of Zürich), Burkhard Stiller (University of Zürich)