[go: up one dir, main page]

Butun et al., 2018 - Google Patents

Demystifying the Security of LoRaWAN v1.

Butun et al., 2018

View PDF
Document ID
163920593220892788
Author
Butun I
Pereira N
Gidlund M
Publication year
Publication venue
Future Internet

External Links

Snippet

LoRa (along with its upper layers definition-LoRaWAN) is one of the most promising LPWAN technologies for implementing Internet of Things (IoT)-based applications. Although being a popular technology, several works in the literature have revealed vulnerabilities and risks …
Continue reading at www.preprints.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Noura et al. LoRaWAN security survey: Issues, threats and possible mitigation techniques
Zhang et al. Towards secure 5G networks: A Survey
Fang et al. Security for 5G mobile wireless networks
Fan et al. Security analysis of zigbee
Giuliano et al. Security access protocols in IoT capillary networks
Chakrabarty et al. Black SDN for the Internet of Things
US8254581B2 (en) Lightweight key distribution and management method for sensor networks
Lacava et al. Securing Bluetooth Low Energy networking: An overview of security procedures and threats
US20130312072A1 (en) Method for establishing secure communication between nodes in a network, network node, key manager, installation device and computer program product
Jokhio et al. Light‐weight framework for security‐sensitive wireless sensor networks applications
Plósz et al. Security vulnerabilities and risks in industrial usage of wireless communication
Liu et al. A taxonomy for the security assessment of ip-based building automation systems: The case of thread
Saeed et al. Pseudonym Mutable Based Privacy for 5G User Identity.
Arapinis et al. Analysis of privacy in mobile telephony systems
Fujdiak et al. Security in low-power wide-area networks: State-of-the-art and development toward the 5G
Hessel et al. LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation
Loukil et al. Investigation on security risk of LoRaWAN: Compatibility scenarios
Qadir et al. Analysis of LPWAN: Cyber-security vulnerabilities and privacy issues in LoRaWAN, Sigfox, and NB-IoT
Najafi et al. A lightweight hierarchical key management approach for internet of things
Alizadeh et al. Secure ticket-based authentication method for IoT applications
Youm An overview of security and privacy issues for Internet of Things
Rong et al. Wireless network security
Butun et al. Demystifying the Security of LoRaWAN v1.
Qi et al. Security analysis of WIA-PA protocol
Solà Campillo Security issues in Internet of Things