LATINOVIČ, B. Optimizing of cyber security of Precision Time Protocol (PTP) on Ethernet for ARM based CPU [online]. Brno: Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. 2024.

Posudky

Posudek vedoucího

Smékal, Zdeněk

Diploma thesis by Borivoje Latinovic solves the problem of choosing a suitable type of security protocol and its implementation using PTP (Precision Time Protocol). First, the author describes the properties of the PTP protocol. He particularly focused on the synchronization process and network properties and described possible usage scenarios. Security protocols were analysed primarily from the perspective of network attributes, including considerations of PTP operations. Another part of the work was devoted to the implementation of selected scenarios in the Linux environment for an embedded system with an ARM processor. At the end, the author carried out measurements and statistical analysis of the obtained data. Borivoje Latinovic worked independently and respected the comments of the supervisor and the consultant. The result is a diploma thesis at a very high professional level with a specific application and data analysis. The graduate has fulfilled the assignment in full and I recommend the work for defence.

Navrhovaná známka
A
Body
95

Posudek oponenta

Ištvánek, Matěj

The thesis is divided into four logical chapters, containing a summary of the literature, a list of symbols and abbreviations, a list of tables, a conclusion, and four appendices. Individual chapters are thoughtfully structured and well explained, including their interrelationships. The author uses enough literature and sources to back the descriptions of protocols, their advantages and limitations. The language is excellent, the author follows correct terminology, and the typography of the thesis is mostly consistent. The exceptions are figures, which could have been in vector graphics or at least higher resolution, and their font could match the one in the thesis. Some tables that are too wide for the page setting (such as Tables 4.5 and 4.8). Equations 1.5 or 4.5 use incorrect typesetting. Furthermore, some chapters may be even too extensive so it may be harder to follow all information. The author had to study a very wide spectrum of knowledge both in the area of communication protocols and encryption or cyber security. The author chose several combinations of protocols based on the extensive theory chapters and tested the results of their operation within a specific framework. For this purpose, the author created a test environment that is part of this work. The statistical analysis could be better visualized. For instance, Figures 4.7 and 4.8 do not convey much information for the difference comparison. I also miss some final visual comparisons (except provided tables with statistical parameters) of all protocols together, instead of solely individual parameters of each scenario. However, the author proved excellent knowledge about the topic, and all goals of the thesis were fulfilled. I strongly recommend this thesis for defense: 95 points, grade A.

Navrhovaná známka
A
Body
95

Otázky

eVSKP id 160690