44 research outputs found

    Demonstration Kit for Keeloq Technology

    Get PDF
    Bakalářská se zabývá návrhem a vytvořením simulačního prostředí pro zabezpečovací technologii KeeLoq po hardwarové i softwarové stránce. V teto práci jsou zmíněny součastné metody zabezpečení dálkových ovladačů a popsána metoda plovoucího kódu, konkrétně technologie KeeLoq.Bachelor thesis deals with the design and create of simulation environment for KeeLoq security technology in both the hardware and software point of view. In this thesis, there are mentioned actual security methods and a method of Rolling code, specifically KeeLoq technology, is desired.

    Cryptography protocol with public key

    Get PDF
    Diplomová práce je úvodem do kryptologie. Práce řeší popis kryptosystémů a dále výběr ideálního kryptosystému pro nízkovýkonový mikrokontroler. Dále je obśahnut návod na instalaci vývojového programu pro Code Composer Studio, několik demonstačních programů, základní ukázka implementace vybraných kryptosystémů s malými čísly a návrh implementace vybraného kryptosystému s velkými čísly.The Master thesis is an introduction to cryptology. The Thesis describe cryptosystems and selects one ideal cypher for low-power microcontroler. In thesis provides manual for instal development program COde Composer Studio, basic implementation of selected cryptosystem with small numbers and suggestion for implementation selected cyptosystem with big numbers.

    Smart Street "Proof of Concept". Data Processing

    Get PDF
    En el proyecto se simula una calle inteligente para ver a futuro su viabilidad. En ésta, se monitoriza y controla los distintos parámetros de una ciudad, tales como; la calidad del aire, el nivel de ruido, la gestión de farolas, control de plazas de parking... Con la finalidad de aplicar IoT a una ciudad real y así controlar su estado en tiempo real a través de una aplicación final, contribuyendo a un consumo eficiente de los recursos. La tecnología LoRaWAN ha sido la elegida para desarrollar el proyecto implementando una red de comunicación basada en end-devices, gateway y servidor

    LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review

    Get PDF
    As LoRaWAN is one of the most popular long-range wireless protocols among low-power IoT applications, more and more focus is shifting towards security. In particular, physical layer topics become relevant to improve the security of LoRaWAN nodes, which are often limited in terms of computational power and communication resources. To this end, e.g., detection methods for wireless attacks improve the integrity and robustness of LoRaWAN access. Further, wireless physical layer techniques have potential to enhance key refreshment and device authentication. In this work, we aim to provide a comprehensive review of various vulnerabilities, countermeasures and security enhancing features concerning the LoRaWAN physical layer. Afterwards, we discuss the impact of the reviewed topics on LoRaWAN security and, subsequently, we identify research gaps as well as promising future research directions

    Development of Cyber-physical security testbedbased on IEC61850 architecture

    Get PDF
    The paper focuses on security in industrial control systems. Numerous protocols and their incompatibility are undermining the security design. Also, the IEC 61850 standard focuses on these issues; in detail, it deals with the compatibility between protocols and, partly security. In the context of this work, a testbed together with traffic generator was designed for IEC 61850 standard and its three main parts – MMS (Manufacturing Message Specification), GOOSE (Generic Object Oriented Substation Events) and Sampled Values. Additionally, the used generator was compared with an example of an RTU (Remote Terminal Unit) unit used in standard ICS (Industrial control systems) networks. The last part of this work consisted of performance testing of the implemented protocols (MMS, GOOSE, Sampled Values)

    Traffic Analysis of IEEE 802.11 on Physical Layer by using Software Defined Radio

    Get PDF
    The security of wireless networks is a fairly discussed topic. There are many threads capable of attacking any personal, public, or company network. One way of protection is to analyze traffic on the desired wireless network and look for irregularities in the traffic. There are various approaches on how to capture and analyze wireless traffic. In this paper, we present three enablers on capturing wireless traffic, including Off-the-shelf wireless cards and software defined radios. The results provide the capabilities of used devices and possibilities on how to analyze the traffic. We also present our developed wireless traffic visualizer written in python that can be utilized to discover possible attacks on wireless networks visually.Peer reviewe
    corecore