National Repository of Grey Literature 80 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Electric meter simulator with DLMS protocol
Tsymbal, Kateryna ; Gerlich, Tomáš (referee) ; Lieskovan, Tomáš (advisor)
This bachelor thesis is focused on getting acquainted with the DLMS/COSEM protocol and its functions. Furthermore, the Java programming language and the Raspberry Pi minicomputer are briefly introduced. The DLMS/COSEM protocol is used to simulate measurements using a smart meter, which ensures communication between the meter simulator and the concentrator. Communication provided by the DLMS/COSEM protocol is widely used in smart grids. The first part of the thesis discusses important information about energy networks and their relationship with smart meters, the importance of smart meters in modern networks and the role of smart networks, which are used for effective energy measurement in a particular area (e.g. for measuring electricity). Data measured in smart grids can be easily analyzed and used to make consumption more effective. The first part also mentions important information about the DLMS/COSEM protocol, the Java programming language and the Raspberry Pi minicomputer. In the second part of the thesis, a test environment is created for testing the smart meter simulator, which communicates using the DLMS/COSEM protocol with the concentrator and transmits the measured values to it. Measured values are manually defined for testing purposes using code changes in the Eclipse IDE. The aim of the work was to create a smart meter simulator that lists predefined values and passes them to the concentrator, which was achieved using the Gurux.DLMS library. Finally, an analysis of this communication was performed using Wireshark. This bachelor thesis is useful for a simple understanding of the DLMS/COSEM protocol and its use in smart grids.
Realization of a smart meter
Cu, Lukáš ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This thesis deals with the issue of smart metering, specifically electricity metering. It introduces the reader to the basic concepts associated with it and describes the technology used to implement such an electricity meter. The practical output of this work is a real smart electricity meter made of a singleboard platform Raspberry Pi 3 B, the Arduino platform and two external modules for measuring the state of electrical network. These modules are current sensor SCT-013-000 and a voltage sensor ZMPT101B. The software solution for controlling individual components and for working with the data is implemented using a combination of code created specifically for this purpose and of code from an external library belonging to Gurux company.
Honeypot: a tool for fighting malware
Karger, David ; Lieskovan, Tomáš (referee) ; Hajný, Jan (advisor)
This bachelor thesis is focused on deploying a honeypot to fight malware. The aim was to study the issue of honeypots and their use in detection and analysis of malware. The first part is dedicated to malware, its history and individual types. The so-called botnet is described in the next part. The last part is devoted on the honeypot itself and its distribution. The practical realization is done through honeypots Cowrie and Mailoney.
Detection and mitigation of cyber attacks at local area networks
Racka, Jan ; Lieskovan, Tomáš (referee) ; Gerlich, Tomáš (advisor)
The bachelor thesis is focused on the detection and mitigation of flood attacks in local area networks. The thesis can be divided into two parts. In the theoretical part, first flooding attacks are described. Then, the problem of attack detection is discussed in depth, including the implemented detection methods. Subsequently, the classification of detection tools by location is discussed and examples of detection tools are given. The last theoretical section is devoted to network mapping methods and topology detection tools. In the practical part, the design of the IDS and the test network is discussed. The network consists of three end devices namely: the IDS, the victim and the attacker. A Mikrotik router is used to ensure connectivity between all the devices. The IDS has been implemented in Python and is composed of individual modules that extend its functionality. The most important module is the detection module, which contains detection methods against SYN Flood, UDP Flood, ICMP Flood attacks and one universal comprehensive method against all flood attacks. The ARP Scan module allowed the IDS to map the network and use ARP queries to detect the presence of endpoint devices in the network. The learning module made it easier to set up rules for each detection method by monitoring network traffic over a period of time. It then determines appropriate rule values from the detected data. The SSH module provided IDS with the ability to proactively respond to attacks and disconnect the attacker from the rest of the network. ARP Scans also use the SSH module to discover information about guests. The IDS has been tested in both virtual and real environments. The results show that the developed detection methods work and the IDS can stop the attack in a reasonable time. ARP Scanning was also tested and was able to detect new guests on average in the first pass. The effect of IDS on communication was also monitored and found to be minimal.
DLMS/COSEM load generator
Kohout, David ; Mlýnek, Petr (referee) ; Lieskovan, Tomáš (advisor)
This work is focused on Smart Metering, specifically the DLMS/COSEM specification. The paper describes most important parts of the standard and its application in smart grids. At first the DLMS protocol is examined. It is responsible for everything related in communication between clients and servers. Next described think is object model COSEM and its objects called OBIS. It shows how can we reference to these objects. In the second part – Traffic analyser are shown options of analysis of DLMS messages. This is after used for monitoring purposes. There is also described network topology including laboratory equipment. All devices were used for developing and testing the load generator of DLMS messages. App, which was created for this work is then described. The paper also assesses found problems in security and implementation of DLMS protocol.
DLMS concentrator simulator
Buš, Ondřej ; Šilhavý, Pavel (referee) ; Lieskovan, Tomáš (advisor)
This work is focused on a field of smart metering and data concentrators. The first part of this paper describes the DLMS/COSEM specification. The first section contains DLMS protocol specification, the process of communication between devices and services that allows data communication. COSEM classes and objects can be found in the second section. These objects are used to access a specific data stored inside smart meters. Lastly, there is an section that is focused on OBIS objects which are used for addressing. In the second part, the concentrator's basic functionalities are described. These functionalities include device management and configuration file storage. The last part then focuses on a web server. The web server allows a user to manage the concentrator by adding, editing and removing connected smart meters.
Cyber exercises on the OpenStack platform
Fišarová, Veronika ; Hajný, Jan (referee) ; Lieskovan, Tomáš (advisor)
The goal of this bachelor thesis is to get acquainted with the platforms that are used to create the cyber ranges. The main part of thesis is focused on the cloud platform named OpenStack and its possibilites in creation of cyber ranges. The OpenStack installation options are compared and the selection of the instalation that is suitable for the KYPO project is made. The last part is devoted to the analysis of the KYPO project and the actual installation of OpenStack to the virtual station followed by the deployment of the KYPO platform on the modified OpenStack cloud and the commissioning of a training scenario.
Application for automated power trace measurement
Karabina, Lukáš ; Lieskovan, Tomáš (referee) ; Gerlich, Tomáš (advisor)
Master’s thesis is focused on providing information for the design and implementation of an application for automated power trace measurement. The first and second sections of this thesis summarise the findings on the actual measurement of the power consumption and the use of the results in the analysis of the robustness of cryptographic systems against side channel attacks. In this sections, several methods that can be used in such an analysis are presented. A section on the devices with which the application will communicate is also included. The practical part of this thesis deals with the actual design and development of the application. The design patterns used and the procedures by which the application is created are presented. The individual subsections further describe the actual development, implementation, testing and associated problems.
Modern trends in Wi-Fi IEEE 802.11 networks security
Lieskovan, Tomáš ; Škorpil, Vladislav (referee) ; Endrle, Pavel (advisor)
This work treats the matters of wireless networks, Wi-Fi. The paper describes the various principles of coding, such as WEP, WPA and WPA2. At first the WEP security method is analyzed with the view of the fact that it doesn´t meet contemporary safety requirements, further its successor WPA, namely TKIP and AES authentication methods, and last but not least WPA2 which nowadays serve as a safety standard. The work assesses the safety risks of individual security methods and makes several recommendations to achieve maximum security for wireless networks. In the work a commercially available hardware and for free dissemination available software (Open Source) are used.
The Application of Fuzzy Logic for Rating of Suppliers for the Firm
Ilgner, Tomáš ; Lieskovan, Tomáš (referee) ; Dostál, Petr (advisor)
Master Thesis deals with supplier rating with usage of fuzzy logic as an advanced decision-making method. There was made a model for selection of the optimal technologies supplier for a self-service vehicle wash. The main solution is realized with support of programs MS Excel and MATLAB.

National Repository of Grey Literature : 80 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.