National Repository of Grey Literature 7 records found  Search took 0.01 seconds. 
Security and Privacy in IoT
Utěkal, Josef ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The bachelor's thesis deals with the topic of security and privacy in the field of Internet of Things (IoT), for which resource constrained devices are typical. It is very important to find a suitable operating system that, in addition to low computational requirements, would also offer the desired functionality for these constrained IoT devices, such as real-time capabilities. OS RIOT seems to be the one for IoT. It enables you to run applications written in C language on any supported hardware -- in this bachelor's thesis specifically on Arduino Uno and Arduino Due. The thesis also describes several cryptographic libraries that are supported by OS RIOT. The aim is to implement selected cryptographic libraries and measure their computational and memory requirements on both Arduino devices. This is preceded by a theoretical and practical familiarization with OS RIOT, which is realized by creating the first project, and measuring the computational complexity of each cryptographic function of the WolfSSL library on the Raspberry Pi 4 Model B.
Secure Communication and Data Protection in the Internet of Things
Chadim, Pavel ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This Master's thesis „Secure communication and data protection in the internet of things“ is dealing with crypthografy and crypthographic libraries, which are compared with eachother according to supporting algorithm and standard. For comparing therewere used following libraries: openSSL, wolfSSL, nanoSSL and matrixSSL. Practical part of the thesis is focused on testing the productivity of each ciphers and protocols of openSSL and wolfSSL libraries on RaspberryPi 2 device. Further, the thesis shows the design of communication scenario client-server in the Internet of Things (IoT). Simple authentication protocol client-server was implemented and simulated on RaspberryPi 2 device.
Comparison of cryptographic primitives used in elliptic curve cryptograpny on different hardware platforms
Brychta, Josef ; Martinásek, Zdeněk (referee) ; Fujdiak, Radek (advisor)
This master thesis deals with the implementation of variants of cryptographic libraries containing primitives for elliptic curves. By creating custom metering charts to compare each implementation. The main task was not only the implementation of libraries but also the design and implementation of test scenarios together with the creation of measurement methods for different libraries and hardware platforms. As a result, a number of experimental tests were conducted on different curves and their parameters so that the results of the work included complex problems of elliptic curves in cryptography. The main parameters were power, time and memory consumption.
Secured transmisation within protocol CAN/CANOpen
Vlach, Josef ; Holasová, Eva (referee) ; Fujdiak, Radek (advisor)
This bachelor thesis deals with the use of the CAN protocol and its higher extensions, specifically CANopen in today's time. The aim of this thesis is to analyse and investigate the security aspects of this protocol. Analyses of currently available solutions that can be used to ensure the security of the protocol, bus or peripheral security are presented. The main contribution is the analysis and design of security for the CAN protocol using TLS with the support of the open crypto library wolfSSL. The demonstrative design represents a client and server state that are authenticated against each other using a digital certificate and have encrypted communication secured.
Security and Privacy in IoT
Utěkal, Josef ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
The bachelor's thesis deals with the topic of security and privacy in the field of Internet of Things (IoT), for which resource constrained devices are typical. It is very important to find a suitable operating system that, in addition to low computational requirements, would also offer the desired functionality for these constrained IoT devices, such as real-time capabilities. OS RIOT seems to be the one for IoT. It enables you to run applications written in C language on any supported hardware -- in this bachelor's thesis specifically on Arduino Uno and Arduino Due. The thesis also describes several cryptographic libraries that are supported by OS RIOT. The aim is to implement selected cryptographic libraries and measure their computational and memory requirements on both Arduino devices. This is preceded by a theoretical and practical familiarization with OS RIOT, which is realized by creating the first project, and measuring the computational complexity of each cryptographic function of the WolfSSL library on the Raspberry Pi 4 Model B.
Secure Communication and Data Protection in the Internet of Things
Chadim, Pavel ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This Master's thesis „Secure communication and data protection in the internet of things“ is dealing with crypthografy and crypthographic libraries, which are compared with eachother according to supporting algorithm and standard. For comparing therewere used following libraries: openSSL, wolfSSL, nanoSSL and matrixSSL. Practical part of the thesis is focused on testing the productivity of each ciphers and protocols of openSSL and wolfSSL libraries on RaspberryPi 2 device. Further, the thesis shows the design of communication scenario client-server in the Internet of Things (IoT). Simple authentication protocol client-server was implemented and simulated on RaspberryPi 2 device.
Comparison of cryptographic primitives used in elliptic curve cryptograpny on different hardware platforms
Brychta, Josef ; Martinásek, Zdeněk (referee) ; Fujdiak, Radek (advisor)
This master thesis deals with the implementation of variants of cryptographic libraries containing primitives for elliptic curves. By creating custom metering charts to compare each implementation. The main task was not only the implementation of libraries but also the design and implementation of test scenarios together with the creation of measurement methods for different libraries and hardware platforms. As a result, a number of experimental tests were conducted on different curves and their parameters so that the results of the work included complex problems of elliptic curves in cryptography. The main parameters were power, time and memory consumption.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.