National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
Honeypot for LoRaWAN protocol
Zhukova, Viktoriia ; Pospíšil, Jan (referee) ; Pospíšil, Ondřej (advisor)
The bachelor’s thesis in the theoretical section focuses on LoRaWAN technology. It describes network communication, LoRaWAN security, vulnerabilities, and mitigation measures. The second half of the theoretical section focuses on describing honeypot technology and its distribution, listing its advantages and disadvantages, and comparing IoT honeypots. The practical section focuses on building an experimental environment. There is a description of the selected hardware and software. It describes the commissioning of the LoRaWAN network, the configuration of the gateway, and the startup of the LoRaWAN server. Next, the whole procedure of honeypot assembly is described. Two variants of high-interaction honeypot are described and investigated. One without the use of sandboxing and using a firewall, the other with the use of sandboxing and an implementation of chroot/jail.
System for Transmitting Diagnostic Data from the Car
Uhliar, Martin ; Vašíček, Zdeněk (referee) ; Goldmann, Tomáš (advisor)
This diploma thesis deals with the design and implementation at the software and hardware level of the device, which is used for communication and acquisition of diagnostic data from the car control unit. The acquired data can be stored on the device and also sent via LoRa technology and TheThingsNetwork to a database on a remote server. NB-IoT technology is used for data that needs to be obtained in real time. The recorded data is presented in the form of a mobile application, which displays the obtained data to the user and can notify him of a problem with the vehicle. The device communicates with the car via the CAN bus using the OBD2 protocol and is controlled by an ARM microcontroller.
Honeypot for LoRaWAN protocol
Zhukova, Viktoriia ; Pospíšil, Jan (referee) ; Pospíšil, Ondřej (advisor)
The bachelor’s thesis in the theoretical section focuses on LoRaWAN technology. It describes network communication, LoRaWAN security, vulnerabilities, and mitigation measures. The second half of the theoretical section focuses on describing honeypot technology and its distribution, listing its advantages and disadvantages, and comparing IoT honeypots. The practical section focuses on building an experimental environment. There is a description of the selected hardware and software. It describes the commissioning of the LoRaWAN network, the configuration of the gateway, and the startup of the LoRaWAN server. Next, the whole procedure of honeypot assembly is described. Two variants of high-interaction honeypot are described and investigated. One without the use of sandboxing and using a firewall, the other with the use of sandboxing and an implementation of chroot/jail.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.