A Survey on Secure Data Transfer in the Development of Internet of Things (IoT) Applications Using LoRaWAN Technology

M Sowmya, SM Sundaram, P Murugesan - SN Computer Science, 2024 - Springer
Abstract The Internet of Things (IoT) has given rise to a multitude of interconnected devices
that generate vast volumes of data. Efficient data communication is essential for the success …

LoRaWAN security

O Seller - Journal of ICT Standardization, 2021 - ieeexplore.ieee.org
The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-
vetted algorithms, and end-to-end security. The fundamental properties supported in …

Advancements in LoRaWAN Technology: Scalability and Energy Efficiency for IoT Applications

H Yadav - International Numeric Journal of Machine Learning and …, 2023 - injmr.com
This research paper explores recent strides in LoRaWAN technology, specifically
emphasizing its scalability and energy-efficient attributes tailored for diverse IoT …

Scalability and Performance Analysis of LoRaWAN Networks for IoT Implementation: Comprehensive Review and Research Agenda

I Mujahidin, R Reynaldi - PROtek: Jurnal Ilmiah Teknik …, 2024 - ejournal.unkhair.ac.id
The surge in IoT devices has created the need for a scalable and high-performance network
infrastructure capable of handling massive data flows and diverse application requirements …

IoT Data Collection and Processing System Using LoRa WAN Technology

P Vulchak, M Brych, O Yaremko… - 2023 IEEE 5th …, 2023 - ieeexplore.ieee.org
This paper delves into the burgeoning field of the Internet of Things (IoT), focusing on the
pivotal role of LoRaWAN (Long Range Wide Area Network) technology in constructing long …

Protecting LoRaWan data against untrusted network servers

P De Moraes, AF Da Conceição - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
LoRaWAN is a wireless network technology applied in the Internet of Things long-range
communication. Even though LoRaWAN is an end-to-end data encryption protocol by …

[图书][B] LoRaWAN device security and energy optimization

JA Stranahan Jr - 2020 - search.proquest.com
Resource-constrained devices are commonly connected to a network and become “things”
that make up the Internet of Things (IoT). Many industries are interested in cost-effective …

Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability

HN Noura, O Salman, A Chehab… - 2022 16th International …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is interconnecting a large number of devices, some of which are
constrained in terms of power and computational capability. Currently, battery-powered IoT …

Analysis of Lorawan Protocol and Attacks Against Lorawan-Based IoT Devices

K Tepecik, AF Ağrak - International Journal of Applied Methods in …, 2024 - ijamec.org
In this study, the LoRaWAN protocol, which is a promising candidate for Low-Power Wide
Area Network (LPWAN) in terms of network capacity, network security, battery life, low cost …

Security of join procedure and its delegation in lorawan v1. 1

TCM Dönmez, E Nigussie - Procedia Computer Science, 2018 - Elsevier
We examine the security features of LoRaWAN v1. 1 and propose countermeasures for the
determined security problems. LoRaWAN is among the emerging wireless communication …