National Repository of Grey Literature 78 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Optical information transmission - transmission security
Kondicz, Dávid ; Čučka, Milan (referee) ; Filka, Miloslav (advisor)
The submitted work deals with issues of optical transmissions and its security. We will become familiar with a variety of transferability of information, based on which we can assess the advantages and disadvantages of each technology as compared to optical information transmission. Based on acquired information we will try to implement interception of optical communication of cable TV provider.
Extension of the Monitoring Probe with Wi-Fi Support
Findra, Michal ; Tisovčík, Peter (referee) ; Orsák, Michal (advisor)
The purpose of this work is to study Wi-Fi networks and their security and to create an extension for network probe, which is able to catch and analyze Wi-Fi traffic developed by The Accelerated Network Technologies (ANT) research group on FIT BUT. Study of software flexprobe components are described with proposal of wireless extension. Wi-Fi standards are described with their flaws and tools to crack Wi-Fi security with ability to intercept traffic on specific network. Implementation of wireless extension with testing is described in the last part of this thesis.
Wireless Network
Vincour, Jan ; Popelka, Dušan (referee) ; Koch, Miloš (advisor)
The focus of this Bachalor`s thesis is the design and realization of the wireless network in the company LINDEN s.r.o. The goal is to extend the current WiFi coverage to the entire company and fulfill the company`s requirements on the network availability and security.
Multimedia Services in Mobile Networks
Kovář, Petr ; Molnár, Karol (advisor)
Long time ago, there were developed methods which can allow fast exchange of information at the longest distance possible. Until recent time, the possibilities of long way communications were very limited. There were technological and financial limitations mainly. With telegraph, telephone and the newest – computer networks invention, the telecommunication services became cheaper and much more comprehensive. With accession and high scale spread of internet, the role of communications is much more important. The most actual trend is mobile internet and connected multimedia networks and their instant accessibility from anywhere. On the first side there are classical telecommunication networks as GSM, UMTS, on the other side there is very strong alternative in shape of WiMAX and WiFi networks combination. For the usage of multimedia services in that networks is very important to handle their prefferization over other traffic, which is very difficult task even on wireless media. For the finding of new processes and methods, which can allow it, there is, at fist, the need for highly accurate and authentic mathematical models. In this doctoral thesis is mapped actual state of the art and proposed the new mathematical model of Distribution Coordination Function, which is much-frequent used as access method in 802.11 networks, Wi-Fi.
Wireless Security and Surveillance System
Výborný, Jiří ; Frýza, Tomáš (referee) ; Prokopec, Jan (advisor)
This Master’s thesis deals with design and construction of a wireless security and surveillance system in ZigBee wireless networks (IEEE802.15.4). The design consists of creating a star network topology with intended monitoring of home area via end device boards paired with coordinator board, which provides basic networking functionality. End device is used to send data from a temperature sensor DS1631 and magnetic reed switches to coordinator. ZigBee module ZDM-A1281-A2 made by MeshNetics company embedded on each board contains a micro controller ATMega1281 and a transceiver AT86RF230 working in a 2,4GHz frequency band. System is able to notice of any door or window move actions and too high temperature. The non-fully functional ZigBee stack, which is called an Open MAC software, based on MAC (Media Access Control ) layer and PHY (Physical) layer from MeshNetics, has been used to develop the user software. Open MAC consists of three application samples in C code. One of them was modified by the user for an application of communication between the module and sensors. The same design with module RC2204AT made by Radiocrafts company was tested as well, but it couldn’t be executed. All developed boards have been constructed and tested via Terminal PC program.
Security of wireless computer networks
Jelínek, Martin ; Pelka, Tomáš (referee) ; Doležel, Radek (advisor)
The master's thesis deals with the issue of Wireless Local Area Network (WLAN) from the viewpoint of the security and functional principle of security mechanisms. The transition to the issue concerning the security is accompanied by the methods of wireless data transmission operating on the level of physical layer (FHSS, DSSS, OFDM, MIMO), which is followed by the summary of individual 802.11 standards. The next part deals with the issue of shared transmission medium (CSMA/CA), influence of interference and correcting mechanisms (RTS/CTS). Within the security, the principles of the authentication along with the commonly used methods of security (WEP, WPA, WPA2) are described in detail. The first part concerning security deals with the security in the form of the WEP protocol, which is considered insufficient nowadays and points out the imperfect implementation and the consequent risks. The following part describes the security in the form of WPA which eliminates the implementation weaknesses of the previous WEP security protocol. The description of commonly used mechanisms of authentication (PSK, 802.1x), required temporary key management (PTK, GTK), data integrity (MIC) and encryption which uses TKIP protocol are also included. The last part, possible WLAN security, is aimed at the full support of 802.11i standard, which is called WPA2 (sometimes RSN). That part describes the basic encryption security element CCMP, which is based on the AES block cipher modes. The practical part of the thesis deals with the security verification of current wireless networks. In the process of verification the accessible HW means and programming tools of Open Source Software (OSS) are used. By means of verification it has been pointed out that there are possible security risks resulting from the security method which has been used. Also several recommendations how to reduce the security risks of the used method to minimum are mentioned.
Wireless Networks
Harant, Vladimír ; Šimek, Václav (referee) ; Koch, Miloš (advisor)
This document generally concerns of wireless networks. It provides an overview about commonly used standards for wireless networks and their extensions, analyzes the most spread standards for its security and presents architecture of wireless networks. Next follows design of a business network and its securing, regarding trouble free implementation, affordability and high level of security required.
Wireless Fidelity Networks
Jäger, Vítězslav ; Plchot, Oldřich (referee) ; Koch, Miloš (advisor)
Purpose of my Bachelor‘s thesis is to inform about general problems of wireless networks. My work is giving overview about using standards. It Analyzes the most common of them and focuses on their architecture and safety. Part of my work will be a creation of the wireless network for needs of a high school.
The Use of GPU to Searching for the Secured Wireless Network Keys
Tyrala, Radek ; Pospíchal, Petr (referee) ; Jaroš, Jiří (advisor)
This bachelor thesis proposes an analysis of wireless networks security with a particular focus on Wi-Fi type networks. In order to define the central elements of the thesis, let us follow a description of the main steps, namely: The characteristics of the currently applied security standards are provided together with a discussion of their weak points. A somewhat closer insight is offered into the WPA2 security standard as well as into the related breaking possibilities. A description is realized of the principle of dictionary attacks and their acceleration using parallel processing on the GPU. Another important point presented consists in a comparison of the GPU and CPU performance for an application implementing dictionary attack on wireless networks protected with the 802.11i standard.
Internet of Things (IoT) Security Risks and Threat
Urbanovský, Jozef ; Grégr, Matěj (referee) ; Ryšavý, Ondřej (advisor)
The bachelor's thesis deals with the issue of security and attacks on the Internet of Things devices. The document addresses nature of Internet of Things, its characteristics and information security. The thesis analyzes dierent protocols and standards used by Internet of Things and types of network attacks. Part of work consists of packet capture analysis from IoT honeypot and showcases discoverd attacks. In fnal part, one specifc IoT device is analyzed in terms of security, around which is created an experimental IoT system. Subsequently this system is penetration tested with dierent attacks, thus creating new datasets.

National Repository of Grey Literature : 78 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.