Dr. rer. nat. Jörg Daubert

Picture taken by Henry Stadthagen
NameJörg Daubert
PositionSenior Researcher & Area Head
Smart Protection in Infrastructures
and Networks (SPIN)
Phone +49 (6151) 16 - 23191
Fax+49 (6151) 16 - 23202
OfficeS2|02 A 121
Postal addressTU Darmstadt - FB 20
FG Telekooperation
Hochschulstraße 10
D-64289 Darmstadt

Research Interests

  • Trustworthy mobile devices
  • Privacy & trust
  • Anonymous overlay networks
  • Publish-subscribe

Short Bio

Jörg Daubert studied computer science with a focus on IT management until 2011. In 2016, he obtained his Ph.D. with the thesis on "Anonymous Publish/Subscribe Overlays" at Technische Universität in Darmstadt. Since 2014 he is acting as Area Head of the "Secure Smart Infrastructures" group; since 2016 he is joint PostDoc and Area Head of the "Smart Protection in Infrastructures and Networks" (SPIN) group with 9 researchers within the Telecooperation Lab under Prof. Mühlhäuser in Darmstadt. Starting 2016, Jörg Daubert is also coordinating the research training group (doctoral college) "Privacy and Trust for Mobile Users" with 11 Ph.D. student positions.

Jörg Daubert also worked in industrial research for AGT International, a major industry player in Internet of Things and data analytics, from 2011 to 2015 and is freelancing as an IT consultant from 2011 onwards.

Topics for Bachelor and Master Theses

Please have a look at https://www.tk.informatik.tu-darmstadt.de/de/teaching/abschlussarbeiten-d/ for open theses. We often offer a selection of challenging topics in the area of privacy-preserving communication networks. The focus can be either theoretical – developing attack and protection concepts, or practical – analyzing the aforementioned attacks and concepts via simulation. You can write the thesis in English or German.


Additional Attributes


Don't Steal my Drone: Catching Attackers with an Unmanned Aerial Vehicle Honeypot

Emmanouil Vasilomanolakis, Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser
In: IEEE/IFIP Network Operations and Management Symposium (NOMS), April 2018
[Online-Edition: http://noms2018.ieee-noms.org/]

HoneyDrone: a medium-interaction Unmanned Aerial Vehicle Honeypot

Jörg Daubert, Dhanasekar Boopalan, Max Mühlhäuser, Emmanouil Vasilomanolakis
In: IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies, 2018
[Online-Edition: https://dissect.vcu.edu/2018/]


3 Entries found

Source Protection in P2P Publish/Subscribe

Bachelor Thesis, Master Thesis


Many of todays communication scenarios follow the many-to-many message dissemination structure. Publish/subscribe is a distributed programming pattern for such message dissemination.

Anonymous publish/subscribe protects anonymity of senders and receivers, i.e., senders don't know receivers, receivers don't know senders, and brokers don't know both. Furthermore, anonymous publish/subscribe should not only protects against such malicious insiders, but against global NSA-like attackers as well.

Our construction for anonymous publish/subscribe uses attribute-based P2P overlay networks to protect receiver anonymity. However, protection for senders is still missing.


Anonymous intra-overlay optimization

Master Thesis


Publisher Subscriber or Pub/Sub pattern provides decoupling, scalability, efficiency. However, privacy is a subject that still needs to be dealt with when we consider such systems. In order to ensure privacy we need to look into the anonymity and confidentiality of such systems. Inherently, such communication or design patterns overlook the need for privacy.

Off-late there has been an increasing impetus on security and building systems keeping additional goals of anonymity, confidentiality in mind during inception itself rather than imposing it on the system after developing it. We aim for such an implementation which inherently provides and guarantees anonymity without effecting system performance.


Aspect Under consideration: Churn is measured as the rate at which nodes leave and join the system. Churning should not effect the reliability and availability of a system. There are several suggested ways to handle churn. However, still such systems are susceptible to churn. Information about other nodes helps upto a good extinct in normal pubsub to restructure and balance the communication overlays. In order to safeguard anonymity our system will not provide detailed node data. Addressing this issue and looking for alternatives such that Anonymity is preserved and Anonymous PubSub is efficiently able to handle churn is the research direction which is our primary area of focus. 


Efficient anonymous knowledge distribution

Master Thesis


In a pub/sub system, each node has a specific role, publishers produce information, subscribers consume the information and broker forwards the information generated by the producer to the consumer. Broker nodes have the information cor- responding to the identity of the publisher and the subscriber nodes. An attacker needs to attack only these broker nodes and can get information about publisher-subscriber relationship. In order to establish the relationship between publisher and subscribers, a routing table needs to be maintained and distributed. This process should preserve confidentiality and anonymity of receivers /senders while minimizing message overhead. 

Recent Activities

TPC / Chair / Organizer:

  • ARES 2017 (TPC)
  • CCNC 2016 (Session Chair)

(External) Reviewer:

  • IEEE Journal on Selected Areas in Communications
  • Elsevier Information Systems
  • IEEE Global Communications Conference
  • IDnext OID


Winter Term 2017/2018

  • Protection in Networked Systems (PNS)
    co-organizer, lecturer

Summer Term 2017

  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on trust & privacy
  • Seminar Telecooperation
    topic advisor

Winter Term 2016/2017

  • Protection in Networked Systems (PNS)
    co-organizer, lecturer
  • Seminar Telecooperation
    topic advisor

Summer Term 2016

  • Computer Netzwerke und verteilte Systeme (CNuvS)
    co-organizer, exercise lecturer
  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on privacy
  • Bachelorpraktikum
    topic advisor "AMIS"
  • Seminar Telecooperation
    topic advisor

Winter Term 2015/2016

  • Seminar Telecooperation
    topic advisor
  • Forschungsprojekt TK
    topic advisor "AMIS"

Summer Term 2015

  • Seminar Telecooperation
    topic advisor
  • Lecture TK3 Ubiquitous / Mobile Computing
    lecturer, session on privacy

Winter Term 2014/2015

  • Smart Cities Seminar
  • Seminar Telecooperation
    Co-organizer, topic advisor

Summer Term 2014

  • Resilient Networks
    lecturer (one session)

Summer Term 2013

  • Seminar Telekooperation (course web page)
    Advisor for topics "Location-based privacy enhancing technologies", and "(Social) graph privacy"
  • Bachelor Students Traineeship / Bachelorpraktikum (course web page)
    Project owner "Twitterize - Anonymize Twitter"

Summer Term 2012

  • Seminar Telekooperation
    Advisor for topics "Privacy in wireless sensor networks", "Comparison: Privacy policy languages", "A brief survey on three PPDM techniques", and "Private P2P communities"
  • Bachelor Students Traineeship / Bachelorpraktikum (course web page)
    Project owner "Privacy for da_sense"

Winter Term 2011/2012

  • Seminar Telekooperation
    Advisor for topics "Anonymity metrics", "Anonymity and misbehavior", and "Timing attacks on TOR"
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang