National Repository of Grey Literature 19 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Intelligent Energy Measurements for Homeowners' Association Using 5G Networks
Horčička, Patrik ; Možný, Radek (referee) ; Mašek, Pavel (advisor)
Theoretical analysis of IoT communication technologies LPWAN. A more detailed analysis of 5G-IoT technologies in the licensed frequency band, such as NB-IoT and LTE Cat-M. List of supported application protocols for IoT devices (MQTT, CoAP, LwM2M, DLMS/COSEM) with more detailed information about DLMS/COSEM. Quectel UMTS \& LTE EVB kit with BG770A-GL module was used to create the first reference 5G-IoT device. Measuring of radio properties in two locations. Creation of TLS tunnel for communication between Virtual computer and RPI designed for DLMS/COSEM data.
Simulation of communication part of modern industrial networks
Beneš, Pavel ; Blažek, Petr (referee) ; Fujdiak, Radek (advisor)
The thesis is focused on simulating of protocols from standard IEC 61850 in simulation tool OMNeT++. The theoretical part in the thesis deals with description of the field of operating technologies, supervisory control and data acquisition and protocols Tase-2/ICCP, IEC 61850, IEC 60870-5-104, DNP 3 and DLMS/COSEM. Next part deals with parameters influencing connection and description of simulation tools NS2/NS3, OPNET and OMNeT++. In the practical part there is created a network containing protocols from the standard IEC 61850 in the simulation program OMNeT++. Then in the network a end to end delay and packet loss with increasing traffic is measured.
IoT Traffic Generation and Detection of Security Incidents
Pristaš, Ján ; Ryšavý, Ondřej (referee) ; Matoušek, Petr (advisor)
The main purpose of my bachelor thesis is to design and create operation generating system of IoT networks, creating security incidents and their detection. First part describes basic principles of IoT networks, SCADA systems and communication protocols IEC 60870-5-104 and DLMS/COSEM. Subsequently there are described industrial tools emulating operation of SCADA systems using investigated protocols. The next section describes the security of these systems, along with the risks they face. Based on this information, a tool was designed and implemented to simulate various types of attacks on SCADA systems and track their reactions. The last part of the work is devoted to the possibilities of detecting di erent types of attacks and how to protect the networks from them.
Software library of basic symmetric and asymmetric primitives of modern cryptography on embedded platforms
Miška, Matěj ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This master thesis deals with a search of cryptographic primitives for embedded systems, which are tested on Raspberry Pi platforms and the results compared in the subsequent practical part. The content of the research is an explanation of the use of cryptography in information systems, an example of a protocol using cryptography in the energy sector, the selection of cryptographic primitives based on recommendations from security institutions, a description of Raspberry Pi embedded platforms and an introduction of cryptographic libraries providing tools to perform cryptographic operations. The theoretical part of the thesis results in an overview of the information needed to create a test tool. The subsequent practical part deals with the theoretical design of the required tool, the determination of the functions that the tool must have and the way of performing the testing. This is followed by a description of the choice of the programming language and development environment suitable for this work, together with a description of the internal structure of the developed application. The testing parameters are mainly the computational, memory and time requirements of the cryptographic primitives on the system. The paper concludes with methods of running and controlling the application, possible presentation of the measured results, the actual results of testing the selected embedded platforms and a discussion of these results.
Virtualization of energy infrastructure
Hraboš, Šimon ; Stodůlka, Tomáš (referee) ; Lieskovan, Tomáš (advisor)
This work describes the virtualization process, virtualization tools and virtualization automation. The work also deals with the description of energy infrastructure, KYPO cyber range platform and DLMS/COSEM protocol used in energy. The practical part deals with the virtualization of energy infrastructure using OpenStack and KYPO cyber range platforms. A virtual environment was created using Vagrant application. The OpenStack and KYPO cyber range platforms were subsequently installed in this environment. Next, a sandbox definition was created. The sandbox definition creates a scenario with an energy infrastructure using KYPO platform. The functionality of the energy infrastructure was verified using the Gurux DLMS library.
Implementation of HDLC protocol in network simulators
Polášek, Jaromír ; Mašek, Pavel (referee) ; Pokorný, Jiří (advisor)
This diploma thesis deals with the possibility of using HDLC (High-Level Data Link Control) protocol for communication and addressing of smart metering devices with a data concentrator. The HDLC protocol is used in two DLMS/COSEM (Device Language Message Specification/Companion Specification for Energy Metering) communication profiles. To simulate these communication profiles, the most appropriate simulation program is selected. Using this simulator, the first communication profile is implemented and the second one is designed. Communication profile based on TCP/IP (Transmission Control Protocol/Internet Protocol) has been fully implemented. To implement the three-layer HDLC communication profile, all options have been thoroughly explored. Using these findings, a process was designed to guide the full implementation. For the first communication profile the qualitative parameters are measured, which are then plotted and evaluated.
Smart meter security
Fitere, Ivana ; Fujdiak, Radek (referee) ; Mlýnek, Petr (advisor)
Nowadays, electronization, digitization and data transmission are considered as a standard part of our lives. Security is especially important during data transfer and data processing. This bachelor thesis deals with intelligent metering in power engineering. The~work is based on technical, operational, safety and economic aspects of smart meters rollout. The~first part deals with the~analysis of algorithms, norms and standards for smart metering. The work continues with a description of~the~current state of~smart metering in the Czech and Slovak Republics. The next chapters are devoted to~the~creation of an evaluation model, two different security scenarios, their analysis and evaluation based on net present value (NPV). Finally, the results of a real test of GSM communication at two different security levels. Models are displayed in the attached XLS file.
Cyber security tester of elements used in industrial networks and energy industry
Březina, Jiří ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This thesis deals with the issue of security analysis of DLMS/COSEM protocol and exploitation of these vulnerabilities in real Smart Grid environment. Thesis starts with a description of power grids in the past and present, introducing the environment of modern power grids and the smart grid elements used in it this power grids to reader. This is followed by a detailed discussion of the communication protocols that operate in these networks, beginning from the older and more industrially based Modbus protocol to the DLMS/COSEM protocol which is most used today and his various components and security. The most common current models of link vulnerability attacks are also summarized in the paper. The thesis aims to implement a tester that tests the security of smart grid elements, mainly on the vulnerabilities described in the thesis. The tester primarily focuses on the vulnerability called replay attack and evaluating the execution of this attack in a laboratory environment.
Intelligent Energy Measurements for Homeowners' Association Using 5G Networks
Horčička, Patrik ; Možný, Radek (referee) ; Mašek, Pavel (advisor)
Theoretical analysis of IoT communication technologies LPWAN. A more detailed analysis of 5G-IoT technologies in the licensed frequency band, such as NB-IoT and LTE CatM. Comparison of different energy meters (Smartmeters). List of supported application protocols for IoT devices (MQTT, CoAP, LwM2M, DLMS/COSEM) with more detailed information about DLMS/COSEM. Quectel UMTS & LTE EVB kit with BG770A-GL module was used to create the first reference 5G-IoT device. Measuring of radio properties in two locations. Creation of TLS tunnel for communication between server and RPI designed for DLMS/COSEM data.
Intelligent Energy Measurements for Homeowners' Association Using 5G Networks
Horčička, Patrik ; Možný, Radek (referee) ; Mašek, Pavel (advisor)
Theoretical analysis of IoT communication technologies LPWAN. A more detailed analysis of 5G-IoT technologies in the licensed frequency band, such as NB-IoT and LTE Cat-M. List of supported application protocols for IoT devices (MQTT, CoAP, LwM2M, DLMS/COSEM) with more detailed information about DLMS/COSEM. Quectel UMTS \& LTE EVB kit with BG770A-GL module was used to create the first reference 5G-IoT device. Measuring of radio properties in two locations. Creation of TLS tunnel for communication between Virtual computer and RPI designed for DLMS/COSEM data.

National Repository of Grey Literature : 19 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.