Butun et al., 2018 - Google Patents
Demystifying the Security of LoRaWAN v1.Butun et al., 2018
View PDF- Document ID
- 163920593220892788
- Author
- Butun I
- Pereira N
- Gidlund M
- Publication year
- Publication venue
- Future Internet
External Links
Snippet
LoRa (along with its upper layers definition-LoRaWAN) is one of the most promising LPWAN technologies for implementing Internet of Things (IoT)-based applications. Although being a popular technology, several works in the literature have revealed vulnerabilities and risks …
- 238000005516 engineering process 0 abstract description 24
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Noura et al. | LoRaWAN security survey: Issues, threats and possible mitigation techniques | |
Zhang et al. | Towards secure 5G networks: A Survey | |
Fang et al. | Security for 5G mobile wireless networks | |
Fan et al. | Security analysis of zigbee | |
Giuliano et al. | Security access protocols in IoT capillary networks | |
Chakrabarty et al. | Black SDN for the Internet of Things | |
US8254581B2 (en) | Lightweight key distribution and management method for sensor networks | |
Lacava et al. | Securing Bluetooth Low Energy networking: An overview of security procedures and threats | |
US20130312072A1 (en) | Method for establishing secure communication between nodes in a network, network node, key manager, installation device and computer program product | |
Jokhio et al. | Light‐weight framework for security‐sensitive wireless sensor networks applications | |
Plósz et al. | Security vulnerabilities and risks in industrial usage of wireless communication | |
Liu et al. | A taxonomy for the security assessment of ip-based building automation systems: The case of thread | |
Saeed et al. | Pseudonym Mutable Based Privacy for 5G User Identity. | |
Arapinis et al. | Analysis of privacy in mobile telephony systems | |
Fujdiak et al. | Security in low-power wide-area networks: State-of-the-art and development toward the 5G | |
Hessel et al. | LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation | |
Loukil et al. | Investigation on security risk of LoRaWAN: Compatibility scenarios | |
Qadir et al. | Analysis of LPWAN: Cyber-security vulnerabilities and privacy issues in LoRaWAN, Sigfox, and NB-IoT | |
Najafi et al. | A lightweight hierarchical key management approach for internet of things | |
Alizadeh et al. | Secure ticket-based authentication method for IoT applications | |
Youm | An overview of security and privacy issues for Internet of Things | |
Rong et al. | Wireless network security | |
Butun et al. | Demystifying the Security of LoRaWAN v1. | |
Qi et al. | Security analysis of WIA-PA protocol | |
Solà Campillo | Security issues in Internet of Things |