Optimizing of cyber security of Precision Time Protocol (PTP) on Ethernet for ARM based CPU

Loading...
Thumbnail Image

Date

Authors

Latinovič, Borivoje

Mark

A

Journal Title

Journal ISSN

Volume Title

Publisher

Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií

ORCID

Abstract

This thesis provides the selection and implementation of different security protocols to be used with Precision Time Protocol (PTP). The thesis further tests the behavior of PTP under different security protocols, using an automatized measurement tool, and analyses the effect on PTP in order to determine the most optimal security protocol.
This thesis provides the selection and implementation of different security protocols to be used with Precision Time Protocol (PTP). The thesis further tests the behavior of PTP under different security protocols, using an automatized measurement tool, and analyses the effect on PTP in order to determine the most optimal security protocol.

Description

Citation

LATINOVIČ, B. Optimizing of cyber security of Precision Time Protocol (PTP) on Ethernet for ARM based CPU [online]. Brno: Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. 2024.

Document type

Document version

Date of access to the full text

Language of document

en

Study field

bez specializace

Comittee

prof. Ing. Jan Hajný, Ph.D. (předseda) doc. Ing. Jiří Hošek, Ph.D. (místopředseda) Ing. Josef Vojtěch, Ph.D. (člen) Ing. Jan Látal, Ph.D. (člen) Ing. Martin Štůsek, Ph.D. (člen) doc. Ing. Petr Münster, Ph.D. (člen)

Date of acceptance

2024-06-06

Defence

Student presented the results of his thesis and the committee got familiar with reviewer's report. Opponent's question: Would it be useful to use spectrum (transformation to frequency or time-frequency domain) instead of time-series representation for the statistical analysis? What could FFT show in proposed comparisons? - The student answered the question sufficiently. Compare the results achieved for the most suitable combination of protocols and for the least suitable combination of protocols for software timestamping from the point of PTP accuracy within one graph or table. - The student answered the question sufficiently. Student defended his Diploma Thesis and answered the questions from the members of the committee and the reviewer.

Result of defence

práce byla úspěšně obhájena

DOI

Collections

Endorsement

Review

Supplemented By

Referenced By

Citace PRO