Threat Analysis of a Neutral Host Network Architecture (ST)

To propagate access to the public mobile network over a neutral host network, owned by a third party. With this solution, the internal switching architecture of a publicly accessible building is used. This technology is already specified, approved by all local network operators and in use in the United Kingdom, for example. There are currently no known active installations in Germany.

With every new technology and every new use case, new threats arise for the privacy and security of users, but also for network operators. In order to build trust in new technologies, it is of utmost importance to know not only which threats occur in the intended use cases, but also what the impact of each threat is and how to mitigate them.

In this student research project, you will create a systematic threat model for a given neutral host network architecture. You will use a reproducible and established method to evaluate the architecture in terms of its security and learn a lot about several known attacks. All possible threats shall be categorized. Countermeasures for threats shall be researched in scientific literature. If countermeasures do not exist, the student shall propose possible remedies.


If you have a topic on your mind that is not listed here, please feel free to reach out to B.Sc. Jennifer Gabriel. She will help you to get in contact with a suitable supervisor. We will then create an individual topic that also fits your interest 😉

ST = Student Thesis

MT = Masters Thesis

DT = Diploma Thesis

Werbeagentur Dresdenbetreut von der |Feuerpanda GmbH |Design & Technik || www.feuerpanda.dePNG  ��� IHDR���������x��� pHYs����od���tEXtSoftware�www.inkscape.org<�� �IDATx{de}'f.@($@6Ȑ,fS[j^$JQ ݀%j5aSAS M TdD"Pn#e.3 sLWO_>?(y9 ����������������������������������������������������������������������������������������������������������������������������������������������������0� QQ&{%ߴi${OmQݧ9ލdq-8דl~o$yy$SRl?CE�!e+vIf$U]Oyڄfk^N-ՈĶTS(caCщ/'yi>.a�1otǞ5}j(Lc!TaC1 �P|$$9zYӶfnw۲3*ojc%9�ن$M{(}87Žwlo.�f]5I~du{;�exIޓTM~�T%'?'YޢZ8Ԇ1I~7I~+թp�0I~$WTCg@T`8<|HN�P&%wI(ɉ5p[IN]X�$&y�腭Iϊ޺i2Tu�InNnV L�(S|.{�&I./.d6]LЯޕ2ƙh}oG�75�ؚ$_ovԗLHr]_�I@,*wd*/ɞuӬoF�;䄺k.Xu@a0MrG Ijhܤ I.�豿Hߊj`-j �K~3.hZWu|y-LO":�Ě$ɓnNrh�ГB@Oo;Ee$ߏ�cKm{6P&ǧ:^}'� Q$z�B�$b:L'a#]�0KuK�dI?�Њ$yOltm`Y�Zub]vz72x|�f&:xWEn׭(_$wAAttP �#WI^$A;:PVh�)$N'9Qs;&7y N�asN#�3?�tˢ$_:�׉c�S:L~@Y_꒿�@w="yu.%WIiL&Y�YTn\G�>�zm$�m�Յ ~dϹ��esv><�(F�d$O%Nϥx;h�Pv>n��VOny LOr_;_�tۋ{s;#���V?@,Hu ["�k~"6:pF4�7'yO+h5�hq�7oeV�~䨖�zamB@�Ց^=+LF1�@=[ �n�wfݫgLIr�^XW$o͎(#@[^&GfNtn!�PYl��ˬ6�>B�ޙՏɲ$f_�vev`PI~sf�>Z�w ��0|:�N@!�@ػ/I^N �FdT;؏>�@-oLL?� i{L@�L ,�iG�fZ!ɾ-�dޜrL�j�.�Δ|�pL �z�`����ASr��ה#�X&lJ[�]ZE}S��I썩u�&*�޽:�zd � � ��Fm4��6�6iO:�eu�I,'8,?� 2ɵ�& �w�a�`�.})��`x*�,A!�@i��.]��'��ڥ;߿L&ymv�`mO{l0q`y4�6`َ�tÛ޴s}g] ^�nz;[oyd�L: hX"YZ>uWƞ4}k(Fǂk/>�Î^�,^kO=j2i�XZC!0=6oNFä�쳓{Xl'�@_Yn#Tz�~Ux 9Zώ~�1$+WV;ja�B\ `j\p]0)'G~tir}%\Pw5`-cM? Nn1<&� Ϊ|A] 08&� y}(y+�fc� [$X�L� |{ɉ'] П�Zg}w>/[ð>`=HXZfM'EQwE@I�|w$Vw5@}M 0SOMnZ,xauW�B^+tի /�!`q�uYX �j,!T~﮻�#�@rɪU;�`c|Z50d�`c~8G `"@k�-_\}r] 0w@,Lb~wIm%7ݔqD�۽Lϋ+VT^w�Y$��[0d⋓v"5�}˖%\uWruWޢy�w#j}G] 03#�@XQ]Vk}`j�a X�O��dߟ{n�9 �cM曓j�G>;ꪂ˖] YwX#Tϯ"U%٣*~�zmyIv `DsLu퀛oN;j`>/̀�Ӽ>F�O̟s}'Ot��KN/a%��}裓oLn%9ᄺa�uV>H:j`X�yɇ>j`�{9̂�� ŋk$pRuWL��̡&_zri] %YPw�wW;j, T邫WW^_6/nuWUU7za"��#oɻ]w5P'�A'ZU8𺫁:�[C"%�q{s}G?Z]X��$Y<;O�@NJn-#�V6{ﺫN��parEڵ'%CC��Ѳe5$wݕqF@'��w$Z8Ⱥ��ZbEukM٧j9`.W5?qG@[2ǒGhR��fCɹ&矯3�_\rIr ?c@'16�D\w]r/] t��0+Yy1� /|'lպ�F֭׾|uWl$ܒ\rIuW$E��ᇓΫ5�%?_?߮`R�$��reں+i^uW {M~5�__??`�uU庫Zg �Т+/N{JmWT7Zw%@5d[dۼ ɭ[\xar)ɪUuWݦ$bjΫ&_brU+] 9�,o}+'͉��4cKnJٔ$��3$Hr꩚? ?S�06oN3I6n7�χQ26߸�R�ݰ}{r e�� ?ǓJbs  :G~0y5`*F�`hlܘ| ɟieK�M�76ɳ] 06$� ~ᄎ+˸5�� 5kyvx9 @ٰ!gk14.??Id{Y} ĶmW|ɯ~Uw5`{Hd@R �Onn] 0vLϛl#PGI??9�Br%q%+W] 0|v)�Wlݚ|k'>__w54�:rK~�@VN>j_zc� ?_?;ߩ`ۺ5WO}*yIj1i�xB`4\Y_Jؓ)�N}=7D�n/ /LN9%`̎^<$;x+H^~j�&�+.JJ�&Siߎ)"ْꎀ@+;y{y~_d؋y4 �nyU`&O摽ɗ\uU+uW0[~O �F�`*۷'freO] @�`*7 7]@k� Sٶ �b��κ��H��$��e0k�${ɎF�${]�U57d)4�� ]z���O��$��BzP�;ON0Y�y �z牉& �� ]~r2#�I,w(+>۫�Z7'O$�`X<1Ʃ�0&�� '&(��pki.�m*�<ڽ:�d'=׿L'ٔda7+�$Kd7&(mIvU�@W=:YOH5]*�Gzc�0�0y#��0 �F��` ��0 �L6$ٷ��ݶHF��ޜ)�����`8Mg �Ӧ�oMgZ(IvdE�@WmKW6ӎ�Lq!�o=<]OfH�A3c��`t$�X�e="$)eI;�@$ˊvqH}�`P<8SOf7$?c1�@o̪g ��0\nN�� YY/+g,o�۞)CflG���VvV�̺W�nn�w;[OIk-�tۣE =$�zZٹ�pS�Rnu `A�EÊdl?@lMrCU�]W4;qIos�@לP؛[]"y =~�;[mI6?�t|)$)ݓ�tijI/Z`[#�E%W,�1׶6G�L%yE�h$o)pk�R$|�sv2$)}M\�dC�H"y1r �e:q Ij $o�="yu.@$q�Yx? ъN�w8P'[6ܝlƜo4[c >~A7}K�)g&ۧYsNsxf8&6c �����������������������������������������������������������������������������������������������������������������������������������������������������vO4f