A more secure Internet through Internet Lite

From its-wiki.no
Jump to: navigation, search

A more secure Internet through Internet Lite

by N.n.
Supervisor(s) Josef.Noll
Due date 2022/12/01
Status Planned
Problem description: Internet lite is the terminology used to address the free access to information for all. The role of digital technology in achieving the Sustainable Development Goals (SDGs) is well-established and integrated into the Agenda 2030.

The thesis will address how Internet Lite, e.g. using the AMP layers, enhances the security of the Internet. The "full Internet" has a series of challenges, e.g. email attachments with macros in .xls, .docx, malware hidden as heavy java codes or other functionalities inviting for attacks. By introducing an Internet lite consisting of the "bare minimum", e.g. text, pictures and a set of lightweight java scripts, one can reduce the attack vectors drastically. The thesis will explore methods for accessing and comparing the security aspects of Internet Lite vs full Internet.

Digital access is the key to digital development – a global public good, which can act as a catalyst towards achieving sustainability, participation and inclusive development. Digitalisation is intrinsic to achieving good health (SDG 3), good education (SDG 4), equality and empowerment (SDGs 5 and 10), decent work and economic growth (SDG 8), partnership (SDG 17), all driven by SDG 9 – industrial innovation and infrastructure. Internet lite establishes the freemium (free & premium) model for digital access. Free access to information, being text, pictures and local video, and premium access to broadband content such as video and games. The concept was established by the Basic Internet Foundation in order to enable digital inclusion in developing economies.

Methods and Tools: The tools and methods in this thesis are based on
  • A set of scenario, describing the challenges
  • A list of requirements being extracted from the scenarios
  • A description and evaluation of technologies and tools being candidates for solutions
  • A functional architecture/description of the envisaged system
  • An implementation of the core concepts
  • A demonstration of the solution
  • An evaluation of the solution, including a critical review of the descisions taken earlier
  • Conclusions
  • References
Time schedule The envisaged time schedule (for a long thesis/60 ECTS) is:
T0 0 starting month, T0+m denotes the month where the contribution to a certain chapter shalle be finalized
T0+2 months: create an initial page describing the scenario
T0+3: Provide a list of technologies which you think are necessary for the thesis
T0+4: Establish the table of content (TOC) of the envisaged thesis. Each section shall contain 3-10 keywords describing the content of that section
T0+7: Provide a draft of section 2 (scenario) and 3 (technologies)
T0+10: Establish a draft on what to implement/architecture
T0+11: Set-up an implementation, testing and evaluation plan
T0+15: Evaluate your solution based on a set of parameters, keep in mind there is no such thing as a free lunch
T0+17: Deliver the thesis
Pre-Knowledge This thesis includes a reasonable amount of programming. The envisaged thesis is based on radio communications, thus expects the user to have followed at least two radio-related courses
Approved Pending by
Keywords Digital Inclusion, Basic Internet, Freemium Access, Societal Security, AMP, 5G, Network Slicing

this page was created by Special:FormEdit/Thesis, and can be edited by Special:FormEdit/Thesis/A more secure Internet through Internet Lite

This page provides hints on what to include in your master thesis.


Title page, abstract, ...

1. Introduction, containing: short intro into the area, what is happening
1.1 Motivation, containing: what triggered me to write about what I'm writing about
1.2 Methods, containing: which methods are you using, how do you apply them
2. Scenario, optional chapter for explaining some use cases
2.1 user scenario, (bad name, needs something bedre)
2.2 Requirements/Technological challenges
3. State-of-the art/Analysis of technology, structure your content after hardware/SW (or other domains). Describe which technologies might be used to answer the challenges, and how they can answer the challenges
3.1 technology A
3.2 technology B
4. Implementation
4.1 Architecture, functionality
5. Evaluation
6. Conclusions

Regarding 5G and Network slicing, read: https://its-wiki.no/images/2/26/201806Reducing_Inequalities_5G_Thanh.pdf Thanh van Do, Josef Noll, Sudhir Dixit, Bruno Dzogovic, Van Thuan Do, Boning Feng, "Reducing Inequalities with 5G Internet Light Network Slice", 5G World Summit, IEEE 5G World Forum, 9-11July2018, Santa Clara, California, USA


Red line

Your thesis should have a "red line", which is visible throughout the whole thesis. This means you should mention in the beginning of each chapter how the chapter contributes to the "goals of the thesis".

Use of scientific methods

A thesis follows a standard method:

  • describe the problem (problemstilling)
  • extract the challenges. These challenges should be measurable, e.g. method is too slow to be useful to voice handover.
  • Analyse technology with respect to challenges. Don't write & repeat "everything" from a certain technology, concentrate on those parts (e.g. protocols) which are of importance for your problem


  • Wikipedia is good to use to get an overview on what is happening. But there is not scientific verification of Wikipedia, thus you should use wikipedia only in the introduction of a chapter (if you use text from wikipedia). Use scientific literature for your thesis.
  • Scientific library is "at your hand", you can get there directly from UiO: [[How to get access to IEEE, Springer and other scientific literature -> Unik/UiOLibrary]]
  • I suggest that references to web pages, e.g. OASIS, W3C standards, are given in a footnote. Only if you find white papers or other .pdf documents on a web page then you refer to them in the reference section.

Evaluation of own work

Perform an evaluation of your own work. Revisit the challenges and discuss in how you fulfilled them. Provide alternative solution and discuss what should be done (or what could have been done).