Jump to contentJump to search
Photo of

Scientist

Dr. Andre Ippisch
Universitätsstr. 1
Building: 25.12
Floor/Room: 01.27
40225 Düsseldorf
+49 211 81-12047
+49 211 81-13463

Curriculum Vitae

Dr. Andre Ippisch studied Computer Science, Mathmatics and Physics at the Heinrich-Heine-University of Düsseldorf from late 2009 to 2015. In his Computer Science studies he focused on computer networks, later he specialized in the area of Opportunistic Networks and Mobile Communication. His master thesis is titled "A fully distributed Multilayer Framework for Opportunistic Networks as an Android Application", he graduated in March 2015.

From 2015 till 2019 Andre Ippisch was researcher and Ph.D. student in the Lab for Technology of Social Networks, led by Jun.-Prof. Dr.-Ing. Kalman Graffi. His research interests are Opportunistic Networking, Mobile Communication and decentralized Security. The Android Programming lecture of the Computer Science Institute was held by Andre Ippisch twice.

My Research

Opportunistic Networks are mobile ad hoc networks in which unpredictable and unstable topologies, prolonged disconnections, and partitions can occur frequently. They are a subset of Delay Tolerant Networks in which communication opportunities are intermittent, so an end-to-end path between the source and the destination may never exist. With the help of current smartphones Opportunistic Networks can be created, because smartphones have the necessary radio technologies and the owner's course of movements is similar to those of Opportunistic Networks.

The focus of research was spontanous creation of networks of mobile clients on the network layer. Hereby the research of possibilities of a direct communication between several mobile devices with different operating systems without user interaction was the first goal. Further, decentralized mechanisms of access control and security were analysed. A concept of decentralized management of cryptographic keys was designed. The possibilities of identifying nodes in the network was researched to ensure a secure communication between nodes. After developing the secure direct communication we used multi-hop communication to offer data transmission chains over several nodes in between. By this, the distance of the data transmission is extended. The concepts of access control and security were adopted for the multi-hop communication.

Responsible for the content: