Robust
Communication
Prototype
Under the guidance of:
Prof. Dr. Peter Dillinger
Prof. Dr. Gerd Moeckel
Master Thesis
Index
• Introduction
• User Authentication via JSON Web Token (JWT)
• Assigning user rights through user data
• Registration of user devices through multifactor Authentication
• Finding user’s location and supporting frequency
• Relaying an emergency note/message
• Authenticate the communication lines
• Communication among the users
• User Rights
• Security concerns
• Conclusion
Introduction
• A backup for communication and
relaying messages, aside from the
main API.
• Initiates desperate
measures/protocols to establish
communication among users and the
system.
• Uses a Token based authentication
system.
• Understanding which users require
the emergency service.
3
User Authentication via JSON Web Token (JWT)
4
API 1
Database with the user
information
API 2
Main Server Robust Communication Prototype (RCP) Server
Gets
Communication Portal
Database storing the
user information
Authe-
nticator
Token Decoder
Login Form
Stores
Proceeds
Accessed
Retrieve
Password
Email Id
Token
Generator
Authorization
Name
Transmitted
Header
Signature
Payload
Assigning user rights through user data
• The user rights are decided by the admin based on the type of users.
• If general users, they have the rights to receive message and communicate with one
another.
• If Organizers, they have special rights.
• All these users have a time limit to avail the service of this system.
5
Registration of user devices through 2 Factor
Authentication: Factor-1
6
Login Form
Password
Email Id
Name
Email Server
Inbox code
Code Confirmation
Enter the code below
User’s
Device
User
Proceeds
Projection
Confirm
Registration of user devices through 2 Factor
Authentication: Factor-2
7
Device Conformation
Please Authenticate
your device!
Email Server
Inbox code
Code Confirmation
Enter the code below
Proceeds
Proceed
User User’s
Device
Projection
Confirm
Finding user’s location
and
supporting frequency
8
Relaying an
emergency
note/message
Authenticate the communication lines
10
Communication
among the users
• Communication from one to one (or) many to many are possible.
• A limited message size is permissible for each relay.
• The communication channels/rooms are temporary.
11
User Rights
Security concerns
• A possible Token hijack during
transmission
• Sabotaging the connection requests,
reveals the key and addresses of the
users
• Live relay of user’s location to the API
13
Conclusion
• Developed a possible way to securely pass user details.
• Understood how a multi factor authentication works and its importance.
• Found a cheap and reliable way to relay messages.
• The complexity and necessity of securing communication channels.
14
References
• Kofler, M., Gebeshuber, K., Kloep, P., Neugebauer, F., Zingsheim, A., Hackner, T., Widl, M., Scheible, T., Aigner, R., Wübbeling, M., & Kania, S.
(2023). Hacking and security: The Com-prehensive Guide to Penetration Testing and Cybersecurity. SAP Press.
• Bellovin, S. M. (2015). Thinking security: Stopping Next Year’s Hackers. Addison-Wesley Pro-fessional.
• Fanti, M. (2023). Implementing Multifactor Authentication. Packt Publishing.
• Gough, J., Bryant, D., & Auburn, M. (2023). Mastering API architecture: Defining, Connecting, and Securing Distributed Systems and
Microservices.
• Heidelberg: Cyber-Attacke auf SRH – Gestohlene Daten im Darknet aufgetaucht, https://www.heidelberg24.de/heidelberg/heidelberg-srh-
hacker-angriff-attacke-klinik-hochschule-computer-darknet-90997701.html, 01.12.2023
• Using waves to communicate, https://radio-waves.orange.com/en/using-waves-to-com-municate/, 04.02.2024
• What is LoRaWAN® Specification, https://lora-alliance.org/about-lorawan/, 20.03.2024
• Introduction to JSON Web Tokens, https://jwt.io/introduction, 01.03.2024
• General Data Protection Regulation (GDPR), https://gdpr-info.eu/, 12.04.2024
• DATA PROTECTION DECLARATION, https://www.uni-heidelberg.de/en/data-protection-declaration, 05.02.2024
• What Is Internet Communication & How Can We Communicate Over The Internet? https://www.fonada.com/blog/what-is-internet-
communication/, 10.06.2024
• Draw.io, https://app.diagrams.net/, 19.06.2024
15
Thank you
16

.....Robust Communication Prototype.....

  • 1.
    Robust Communication Prototype Under the guidanceof: Prof. Dr. Peter Dillinger Prof. Dr. Gerd Moeckel Master Thesis
  • 2.
    Index • Introduction • UserAuthentication via JSON Web Token (JWT) • Assigning user rights through user data • Registration of user devices through multifactor Authentication • Finding user’s location and supporting frequency • Relaying an emergency note/message • Authenticate the communication lines • Communication among the users • User Rights • Security concerns • Conclusion
  • 3.
    Introduction • A backupfor communication and relaying messages, aside from the main API. • Initiates desperate measures/protocols to establish communication among users and the system. • Uses a Token based authentication system. • Understanding which users require the emergency service. 3
  • 4.
    User Authentication viaJSON Web Token (JWT) 4 API 1 Database with the user information API 2 Main Server Robust Communication Prototype (RCP) Server Gets Communication Portal Database storing the user information Authe- nticator Token Decoder Login Form Stores Proceeds Accessed Retrieve Password Email Id Token Generator Authorization Name Transmitted Header Signature Payload
  • 5.
    Assigning user rightsthrough user data • The user rights are decided by the admin based on the type of users. • If general users, they have the rights to receive message and communicate with one another. • If Organizers, they have special rights. • All these users have a time limit to avail the service of this system. 5
  • 6.
    Registration of userdevices through 2 Factor Authentication: Factor-1 6 Login Form Password Email Id Name Email Server Inbox code Code Confirmation Enter the code below User’s Device User Proceeds Projection Confirm
  • 7.
    Registration of userdevices through 2 Factor Authentication: Factor-2 7 Device Conformation Please Authenticate your device! Email Server Inbox code Code Confirmation Enter the code below Proceeds Proceed User User’s Device Projection Confirm
  • 8.
  • 9.
  • 10.
  • 11.
    Communication among the users •Communication from one to one (or) many to many are possible. • A limited message size is permissible for each relay. • The communication channels/rooms are temporary. 11
  • 12.
  • 13.
    Security concerns • Apossible Token hijack during transmission • Sabotaging the connection requests, reveals the key and addresses of the users • Live relay of user’s location to the API 13
  • 14.
    Conclusion • Developed apossible way to securely pass user details. • Understood how a multi factor authentication works and its importance. • Found a cheap and reliable way to relay messages. • The complexity and necessity of securing communication channels. 14
  • 15.
    References • Kofler, M.,Gebeshuber, K., Kloep, P., Neugebauer, F., Zingsheim, A., Hackner, T., Widl, M., Scheible, T., Aigner, R., Wübbeling, M., & Kania, S. (2023). Hacking and security: The Com-prehensive Guide to Penetration Testing and Cybersecurity. SAP Press. • Bellovin, S. M. (2015). Thinking security: Stopping Next Year’s Hackers. Addison-Wesley Pro-fessional. • Fanti, M. (2023). Implementing Multifactor Authentication. Packt Publishing. • Gough, J., Bryant, D., & Auburn, M. (2023). Mastering API architecture: Defining, Connecting, and Securing Distributed Systems and Microservices. • Heidelberg: Cyber-Attacke auf SRH – Gestohlene Daten im Darknet aufgetaucht, https://www.heidelberg24.de/heidelberg/heidelberg-srh- hacker-angriff-attacke-klinik-hochschule-computer-darknet-90997701.html, 01.12.2023 • Using waves to communicate, https://radio-waves.orange.com/en/using-waves-to-com-municate/, 04.02.2024 • What is LoRaWAN® Specification, https://lora-alliance.org/about-lorawan/, 20.03.2024 • Introduction to JSON Web Tokens, https://jwt.io/introduction, 01.03.2024 • General Data Protection Regulation (GDPR), https://gdpr-info.eu/, 12.04.2024 • DATA PROTECTION DECLARATION, https://www.uni-heidelberg.de/en/data-protection-declaration, 05.02.2024 • What Is Internet Communication & How Can We Communicate Over The Internet? https://www.fonada.com/blog/what-is-internet- communication/, 10.06.2024 • Draw.io, https://app.diagrams.net/, 19.06.2024 15
  • 16.