National Repository of Grey Literature 406 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Securing IoT applications with Arm Cortex-M33 microcontrollers
Tonka, Marek ; Zeman, Václav (referee) ; Slavíček, Karel (advisor)
Bakalárska práca analyzuje vlastnosti moderných mikrokontrolérov s architektúrou ARM Cortex-M33 a ich prínos pre zabezpečenie IoT aplikácií. Teoretická časť je zameraná na predstavenie spoločnosti ARM spolu s charakteristikou architektúry ARMv8, na ktorej sú procesory Cortex-M33 postavené. Taktiež sa kladie dôraz na predstavanie novej technológie TrustZone, ktorá je klúčovým zabezpečovacím prvkom týchto procesorov. Následne je predstavený výber mikrokontrolérov a ich vlastností od piatich popredných polovodičových spoločností. Praktická časť zahŕňa inštaláciu a nastavenie dvoch IDE pre nasledovnú prácu s doskami NUCLEO-575-ZI-Q a LPC55S69-EVK. Na základe týchto vývojových dosiek sa testujú štyri jedinečné funkcie, ktoré poukazujú na výhody používania procesorov ARM na zabezpečenie aplikácií internetu vecí.
Integration of industrial spanningtree protocols
Segeč, Ronald ; Zeman, Václav (referee) ; Slavíček, Karel (advisor)
The bachelor thesis focuses on the analysis and implementation of spanning tree protocols in the field of industrial Ethernet networks with emphasis on the use of different types of redundant solutions. The scope of this thesis is to provide a comprehensive overview of industrial networks and to describe the different protocols that use redundant solutions in networks. The intent of this thesis is to present the use of looping devices together with redundant solutions for the benefit of creating a stable network system. The aim of working with the lab devices was to implement the most suitable resilient looping with the possibility of using a combination of the different spanning tree protocols within a single network system. The implementation in an extended system, which used all redundant interconnection possibilities, stemmed from the previously practically verified results of the operation of the individual protocols.
Web App for Beekeeping Hive scale
Dudar, Oleksandra ; Sikora, Marek (referee) ; Zeman, Václav (advisor)
This bachelor’s thesis deals with the design and implementation of a web application for statistical processing and visualization of data from the electronic scale of beehives. The application enables statistical processing of data and presentation in the form of graphs, with the possibility of adding notes and filtering according to data. The implementation uses modern technologies such as React and Next.js and progresses from requirements analysis and design to detailed front-end, backend and predictive model implementation.
Denial of Service detection methods
Horský, Milan ; Zeman, Václav (referee) ; Sikora, Marek (advisor)
This bachelor thesis deals with a methodology for detecting and describing the Denial of Service (DoS) condition on a web server. The aim of the thesis is to develop and implement methods that enable effective detection of DoS attacks in an experimental network. The theoretical part focuses on the analysis of different types of DoS attacks, including their detection on the application server and network side, and discusses possible reasons for false positives. In the practical part, software tools for monitoring and analyzing server and network resources were developed and then tested against different types of DoS attacks. As a result of the work, the proposed methodology has been validated and implemented in an experimental network, which provides useful tools for improving the security and stability of web servers.
IoT LoRaWAN soil moisture and temperature sensor
Pánisz, Peter ; Zeman, Václav (referee) ; Škorpil, Vladislav (advisor)
The goal of this bachelor's thesis was to develop software and design a protective cover for a development board that measures soil moisture, air temperature, and humidity. The project addressed the connection to a low-power wireless network for Internet of Things devices, through which the measured data was transmitted. The received data needed to be processed and decoded through various applications, which also require configuration. The measurement results can be graphically visualized in the form of charts on a public website accessible via the internet. For the administrator, a private address with additional information is available. The thesis also describes concepts such as application containerization, the selection of a suitable low-power network, and solving issues related to a dynamic public IPv4 address.
Standardization of post-quantum cryptography
Rada, Dalibor ; Člupek, Vlastimil (referee) ; Zeman, Václav (advisor)
The topic of the bachelor thesis is the standardization of post-quantum cryptography with respect to quantum-resistant signature schemes, including a possible solution of the related public key infrastructure and a subsequent performance comparison of selected algorithms. The work discusses the main aspects of standardization by NIST and then describes selected quantum-resistant algorithms, including a mapping of the current state of standardization of post-quantum cryptography in the EU. On the basis of the theoretical part, one of the suitable public key infrastructure solutions is selected with the possibility of using post-quantum algorithms. In the next part of the work, a~performance comparison of the selected algorithms is made and a conclusion is drawn. Finally, thanks to the information from the bachelor's thesis, the design of the laboratory task is implemented.
SRv6 protocol and its use in education
Považan, Martin ; Zeman, Václav (referee) ; Slavíček, Karel (advisor)
SRv6 je protokol novej generácie, ktorý kombinuje segmentové smerovanie a IPv6 pomocou flexibilných rozširujúcich hlavičiek IPv6. SRv6 je plynulo implementovaný v súčasných chrbticových sieťach poskytovateľov služieb a jeho cieľom je stať sa nástupcom v súčasnosti používaného protokolu MPLS. Táto bakalárska práca analyzuje protokol SRv6 a opisuje jeho možnosti zabezpečenia a emulácie. Protokol SRv6 je analyzovaný a porovnávaný s protokolom MPLS z hľadiska kybernetickej bezpečnosti. V praktickej časti bolo navrhnuté laboratórne cvičenie demonštrujúce vlastnosti protokolu SRv6 s využitím emulátora siete Containerlab.
Laboratory excercise on authentication cards for access control systems
Monček, Martin ; Zeman, Václav (referee) ; Burda, Karel (advisor)
The main objective of this document is to create a laboratory assignment for subject ZSY, in which students learn how access control systems and card used in it work. They also experience card cloning in both 125 kHz and 13.56 MHz MIFARE classic access control systems. This article summarizes history of access control systems and describe their basic components in addition it summarizes use case and possibilities which is given to modern systems by its control software in its next part article describes the history of identification tags and various possibilities of cloning them. In the last chapter it describes the assignment itself and its prerequisites.
Economical LoRaWAN security device
Varhola, Oliver ; Zeman, Václav (referee) ; Škorpil, Vladislav (advisor)
This master thesis contains a proposal of the solution for economical and energy saving security device with its communications part in a LoRaWAN network. Theoretical part of the thesis describes the most widespread LPWAN networks, i.e. the networks for low-power devices, such as NB-IOT based on LTE technology, Sigfox and LoRaWAN. Also briefly analyses security threats in case of the interference exploitation of the communication channel and describes LoRaWan security in detail. In the practical part there is hardware, power, mechanical solution implemented including the cover of the device. Realization of the software part covers, which types of events should be operated, power saving methods and mesage sending inverval are described. All requirements were implemented at application layer utilizing - LoRaWAN network server and virtual machine applications: MQTT broker, NoreRED, OpenHAB and cloud database InfluxDB with visualisation of the data in Grafana application.
Opensource firewall redundancy
Škurla, Tomáš ; Zeman, Václav (referee) ; Slavíček, Karel (advisor)
This diploma thesis deals with the comparison of different open-source firewalls from the perspective of high availability topology. The goal of the thesis is to determine the most suitable firewall for implementing a topology with high availability. The theoretical part deals with the explanation of the concepts of address translation, the operation of firewalls, and subsequently describes the protocols necessary for the implementation of high availability, followed by a description of the testing using GNS3. The practical part of the thesis describes the preparation of the laboratory environment, as well as the process of configuration and testing of the individual firewalls, followed by an evaluation based on the test results.

National Repository of Grey Literature : 406 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.