National Repository of Grey Literature 5 records found  Search took 0.01 seconds. 
Securing narrowband wireless communication in licensed band
Kolaja, David ; Brychta, Josef (referee) ; Fujdiak, Radek (advisor)
Contemporary demand for mobile devices and development of devices in the Internet of Things is constantly increasing. This reality also raises concerns about security and privacy of ongoing communication. This is no exception for expanding scale of Low Powered Wide Area Network (LPWAN) devices which communicate over Narrowband IoT and the customer of such devices who has to rely on security of provider’s network to secure customer’s data. This security is effective only in operator’s network while there is no end-to-end encryption enabled. Therefore, this thesis deals with the analysis of NB-IoT communication and its possible end-to-end security proposal, which also provides elements of post-quantum algorithms. Last but not least, this thesis deals with application of this proposal on constrained device and evaluation of its effectivness of time, energy and memory demands.
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.
Securing Narrowband Wireless Communication In Licensed Band
Kolaja, David
With everlasting growth of development of devices in the Internet of Things, there is also a difficulty to keep up with the requirements of security-related topics on such devices. This is no exception for expanding the scale of Low Powered Wide Area Network (LPWAN) devices which communicate over Narrowband IoT. Such devices have constrained computing power. Thus developers of these devices are limited to use as much as possible for the implementation of functions, not having enough space for securing its communication. This article focuses on how to possibly secure these communications.
Post-quantum cryptography on constrained devices
Matula, Lukáš ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
In recent years, there has been a lot of technological development, which among other things, brings the designs and implementation of quantum computing. Using Shor’s algorithm for quantum computing, it is highly likely that the mathematical problems, which underlie the cryptographic systems, will be computed in polynomial time. Therefore, it is necessary to pay attention to the development of post-quantum cryptography, which is able to secure systems against quantum attacks. This work includes the summary and the comparison of different types of post-quantum cryptography, followed by measuring and analysing its levels of difficulty in order to implement them into limited devices, such as smart cards. The measured values on the PC are used to determine the most suitable implementation on the circuit card and then the verification method itself is implemented on it.
Securing narrowband wireless communication in licensed band
Kolaja, David ; Brychta, Josef (referee) ; Fujdiak, Radek (advisor)
Contemporary demand for mobile devices and development of devices in the Internet of Things is constantly increasing. This reality also raises concerns about security and privacy of ongoing communication. This is no exception for expanding scale of Low Powered Wide Area Network (LPWAN) devices which communicate over Narrowband IoT and the customer of such devices who has to rely on security of provider’s network to secure customer’s data. This security is effective only in operator’s network while there is no end-to-end encryption enabled. Therefore, this thesis deals with the analysis of NB-IoT communication and its possible end-to-end security proposal, which also provides elements of post-quantum algorithms. Last but not least, this thesis deals with application of this proposal on constrained device and evaluation of its effectivness of time, energy and memory demands.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.