National Repository of Grey Literature 218 records found  beginprevious106 - 115nextend  jump to record: Search took 0.00 seconds. 
Power line transfer function generator
Šenk, Marek ; Mišurec, Jiří (referee) ; Mlýnek, Petr (advisor)
The aim of this thesis is to create a power line transfer function generator in Matlab. Work on introduction explains the concept of power line and describes the different types of topologies and types of cables that power line are the most widely used today. It is also discussed PLC technology, its structure, characteristics of the transmission channel and interferences. The following are approach the types of the modeling of power line. More details are described generally modeling in the frequency (two-port network model), which is used in the created generator. The next section provides a power line model, whose principle is used in the generator. The following is a description of created the generator and comparison with FTW PLC Simulator. In conclusion, the thesis presents the results of simulations the transfer function, which show the magnitude and phase frequency characteristics of different topologies and parameters.
Test Polygon for the Role of Power Line Communication in ensuring ISO 15118 and IEC 61851 Compliance in EVSE Technology
Rusz, Martin ; Mlýnek, Petr
The conference paper focuses on the testing ofa polygon for the role of Power Line Communication (PLC) inensuring compliance with ISO 15118 and IEC 61851 standardsin Electric Vehicle Supply Equipments (EVSE). The study aimsto validate the effectiveness of the proposed polygon as a testplatform for evaluating the performance and interoperabilityof EVSEs that utilize PLC technology for communication withelectric vehicle (EV). The proposed polygon is a reliable testplatform for evaluating the compliance of EVSEs with ISO15118 and IEC 61851 standards, and can help in identifying andresolving interoperability issues between different EVSEs andEVs. The paper highlights the importance of ensuring compliancewith these standards for the reliable and efficient operation ofEVSEs, and demonstrates the potential of the proposed testpolygon as a useful tool for achieving this goal.
Testing the security of smart meters
Fitere, Ivana ; Mlýnek, Petr (referee) ; Kohout, David (advisor)
This thesis studies the topic of smart meters with closer focus on testing of the devices, examples of tests performed on these devices, life cycle of the meter from security and Key Management System perspective. First part summarizes the technologies used in this kind of communication, test types, standards regulating smart metering and description of the life cycle. The second part includes scheme of the Key Management System and laboratory for students, devoted to examination of communication, messages and verifying the security.
Evaluation of broadband couplers for noise injection into powerlines.
Malček, Ladislav ; Musil, Petr ; Mlýnek, Petr
This paper deals with the problem of coupling noise into the transmission power line. The main goal is development of device which can effectively inject noise into transmission lines. This device will be used for testing industrial or commercial-used BPL (Broadband Powerline) modems and their ability to communicate under certain conditions. In the first part, there is an overview of coupler types. Next, the appropriate type was chosen according to required qualities. PCB (Printed Circuit Board) design of final device was developed on the principle of capacitive coupler. In the end, final PCB design was tested with several combinations of magnetic coils and capacitors.
Cyber security tester of elements used in industrial networks and energy industry
Březina, Jiří ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
The following is a detailed discussion of the communication protocols that work in these networks, from the older and more industrially based Modbus protocol, through the IEC 60870 protocol suite, to the most commonly used protocol today, DLMS/COSEM. The paper also summarizes the most common current attack patterns on DLMS/COSEM protocol vulnerabilities. The thesis aims to implement a tester that tests the security of smart grid elements mainly on the vulnerabilities described in the thesis. The tester primarily focuses on the vulnerabilities of overwhelm and replay attacks and evaluating the execution of these attacks in a laboratory environment.
Secure reading of smart meters
Chaloupková, Denisa ; Mlýnek, Petr (referee) ; Kohout, David (advisor)
The work deals with the implementation of the secure push mode of the DLMS standard. It introduces the DLMS/COSEM standard, contains a theory for message security and describes how push works and its attributes. The Gurux library in Java is used and the example gurux.dlms.push.listener is modified. The Raspberry Pi platform is used as the server. Wireshark and the Gurux DLMS Translator available in Gurux GXDLMSDirector were used to verify security of a push message. Subsequently, push messages are compared in terms of their size according to the type of security used. The larger the content of the data sent in the message, the smaller the additional data needed to secure the messages in proportion to the total volume.
DLMS/COSEM protocol security
Tomko, Tomáš ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
The aim of this thesis is to familiarize the reader with the DLMS/COSEM protocol, which is mainly used in the power industry. The thesis introduces the concept of smart grids along with their development and basic legislation. In the following section, all the protocols used in smart energy networks are discussed with most emphasis on the mentioned DLMS/COSEM protocol and its security features and vulnerabilities. Furthermore, the thesis aims to introduce the reader to the security risks in industrial networks and the Cyber Range KYPO platform. It was important to familiarize with the capabilities that this platform offers. The next task of this thesis is to operationalize the KYPO platform in a laboratory environment with a security scenario focused on DLMS/COSEM security. The security scenario that we have managed to create involves the interception of communication and the exploitation of at least two security vulnerabilities of the DLMS/COSEM protocol. All the programs and tools that we have used to achieve the objectives of this thesis have been summarized in more detail in a separate chapter, which is dedicated to the practical part of the thesis. The thesis describes the procedure and the problems that we encountered while completing the thesis assignment. The actual virtual scenario that we prepared runs on a server at the premises of the BUT. On this server is installed Cyber Range platform KYPO in all-in-one configuration. The created security scenario using the DLMS/COSEM protocol contains two users and one attacker located in the same network, as we have defined it. We used a simple text editor to define the network configuration and defined it for the KYPO platform in YAML format, which is used to automate the data in a form that is easy for humans to read. We also used the same YAML format to define playbooks, which serve as the easiest way in Ansible to automate repetitive tasks. We used them to install packages, update existing packages, and prepare the virtual environment to exploit DLMS/COSEM protocol vulnerabilities.
Software library of basic symmetric and asymmetric primitives of modern cryptography on embedded platforms
Miška, Matěj ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This master thesis deals with a search of cryptographic primitives for embedded systems, which are tested on Raspberry Pi platforms and the results compared in the subsequent practical part. The content of the research is an explanation of the use of cryptography in information systems, an example of a protocol using cryptography in the energy sector, the selection of cryptographic primitives based on recommendations from security institutions, a description of Raspberry Pi embedded platforms and an introduction of cryptographic libraries providing tools to perform cryptographic operations. The theoretical part of the thesis results in an overview of the information needed to create a test tool. The subsequent practical part deals with the theoretical design of the required tool, the determination of the functions that the tool must have and the way of performing the testing. This is followed by a description of the choice of the programming language and development environment suitable for this work, together with a description of the internal structure of the developed application. The testing parameters are mainly the computational, memory and time requirements of the cryptographic primitives on the system. The paper concludes with methods of running and controlling the application, possible presentation of the measured results, the actual results of testing the selected embedded platforms and a discussion of these results.
Realization of a smart meter
Cu, Lukáš ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This thesis deals with the issue of smart metering, specifically electricity metering. It introduces the reader to the basic concepts associated with it and describes the technology used to implement such an electricity meter. The practical output of this work is a real smart electricity meter made of a singleboard platform Raspberry Pi 3 B, the Arduino platform and two external modules for measuring the state of electrical network. These modules are current sensor SCT-013-000 and a voltage sensor ZMPT101B. The software solution for controlling individual components and for working with the data is implemented using a combination of code created specifically for this purpose and of code from an external library belonging to Gurux company.
Cyber security tester of elements used in industrial networks and energy industry
Březina, Jiří ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This thesis deals with the issue of security analysis of DLMS/COSEM protocol and exploitation of these vulnerabilities in real Smart Grid environment. Thesis starts with a description of power grids in the past and present, introducing the environment of modern power grids and the smart grid elements used in it this power grids to reader. This is followed by a detailed discussion of the communication protocols that operate in these networks, beginning from the older and more industrially based Modbus protocol to the DLMS/COSEM protocol which is most used today and his various components and security. The most common current models of link vulnerability attacks are also summarized in the paper. The thesis aims to implement a tester that tests the security of smart grid elements, mainly on the vulnerabilities described in the thesis. The tester primarily focuses on the vulnerability called replay attack and evaluating the execution of this attack in a laboratory environment.

National Repository of Grey Literature : 218 records found   beginprevious106 - 115nextend  jump to record:
See also: similar author names
1 Mlýnek, P.
2 Mlýnek, Přemysl
Interested in being notified about new results for this query?
Subscribe to the RSS feed.