Publication detail

EFFICIENT SECURITY OF MODERN LOW-POWER WIRELESS COMMUNICATION TECHNOLOGIES

BLAŽEK, V.

Original Title

EFFICIENT SECURITY OF MODERN LOW-POWER WIRELESS COMMUNICATION TECHNOLOGIES

English Title

EFFICIENT SECURITY OF MODERN LOW-POWER WIRELESS COMMUNICATION TECHNOLOGIES

Type

conference paper

Language

en

Original Abstract

This thesis deals with communication security in Sigfox networks. That includes studying the network’s parameters and capabilities and then analysing the appropriate cryptosystems. The thesis contains a description of cryptography as such and a description of cryptosystems that could be implemented in end devices. From the selected cryptosystems, three of the most appropriate are selected based on the required properties, which are put into practice on the Arduino-based development kit and then experimental measurements are made to determine the basic features of the device.

English abstract

This thesis deals with communication security in Sigfox networks. That includes studying the network’s parameters and capabilities and then analysing the appropriate cryptosystems. The thesis contains a description of cryptography as such and a description of cryptosystems that could be implemented in end devices. From the selected cryptosystems, three of the most appropriate are selected based on the required properties, which are put into practice on the Arduino-based development kit and then experimental measurements are made to determine the basic features of the device.

Keywords

Internet of Things; Sigfox; Security Proposal; Encryption; One-Time Pad

Released

26.04.2018

Location

Brno

ISBN

978-80-214-5614-3

Book

Proceedings of the 24th Conference STUDENT EEICT 2018

Edition number

První

Pages from

129

Pages to

131

Pages count

3

Documents

BibTex


@inproceedings{BUT156044,
  author="Vojtěch {Blažek}",
  title="EFFICIENT SECURITY OF MODERN LOW-POWER WIRELESS COMMUNICATION TECHNOLOGIES",
  annote="This thesis deals with communication security in Sigfox networks. That includes studying the network’s parameters and capabilities and then analysing the appropriate cryptosystems. The thesis contains a description of cryptography as such and a description of cryptosystems that could be implemented in end devices. From the selected cryptosystems, three of the most appropriate are selected based on the required properties, which are put into practice on the Arduino-based development kit and then experimental measurements are made to determine the basic features of the
device.",
  booktitle="Proceedings of the 24th Conference STUDENT EEICT 2018",
  chapter="156044",
  howpublished="online",
  year="2018",
  month="april",
  pages="129--131",
  type="conference paper"
}