Národní úložiště šedé literatury Nalezeno 2 záznamů.  Hledání trvalo 0.00 vteřin. 
Detection of anomalies in LoRaWAN type of wireless networks
Bahna, Martin ; Možný, Radek (oponent) ; Pospíšil, Ondřej (vedoucí práce)
The present bachelor thesis deals with the LoRaWAN wireless network’s security. First, IoT is defined in general, together with its technology, its standards and relevant communication protocols. Subsequently, the LPWAN technology is outlined, as well as its requirements and protocols that are most widely used with this technology. The thesis then describes the LoRaWAN technology further, with the focus maintained on its security. Following the security analysis, the most common attacks are mentioned, and possible security incident scenarios are recounted. The practical part of this thesis sheds some light on the process of personal construction of the LoRaWAN network, together with component selection and configuration. Two attacks are then performed on the network, carried out in accordance with the given scenarios. Lastly, a method of detecting these attacks is proposed and explained.
Detection of anomalies in LoRaWAN type of wireless networks
Bahna, Martin ; Možný, Radek (oponent) ; Pospíšil, Ondřej (vedoucí práce)
The present bachelor thesis deals with the LoRaWAN wireless network’s security. First, IoT is defined in general, together with its technology, its standards and relevant communication protocols. Subsequently, the LPWAN technology is outlined, as well as its requirements and protocols that are most widely used with this technology. The thesis then describes the LoRaWAN technology further, with the focus maintained on its security. Following the security analysis, the most common attacks are mentioned, and possible security incident scenarios are recounted. The practical part of this thesis sheds some light on the process of personal construction of the LoRaWAN network, together with component selection and configuration. Two attacks are then performed on the network, carried out in accordance with the given scenarios. Lastly, a method of detecting these attacks is proposed and explained.

Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.