Securing End-Node to Gateway Communication in LoRaWAN with a Lightweight Security Protocol

JJ Barriga, SG Yoo - IEEE Access, 2022 - ieeexplore.ieee.org
The arrival of IoT has brought constant innovation. This innovation has allowed many
“things”(sensors, wearable devices, smart appliances, among others) to be connected to the …

[HTML][HTML] An implementation design of unified protocol architecture for physical layer of lorawan end-nodes

J Park, J Kim - Electronics, 2021 - mdpi.com
LoRa Wide Area Networks (LoRaWAN) can provide a connectivity service to Internet of
Things (IoT) for an extremely long run-time and with low power consumption. As the …

Review of Security Vulnerabilities in LoRaWAN

J Qadir, I Butun, P Gastaldo, DD Caviglia - International Conference on …, 2022 - Springer
Abstract The realm of Low Power Wide Area Network (LPWAN) has a paramount influence
on the way we work and live. For instance, real-time applications and rapid packet transiting …

Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme

J Qadir, I Butun, P Gastaldo, O Aiello… - IEEE Access, 2023 - ieeexplore.ieee.org
Owing to the geographically scattered end devices (EDs) in long-range wide area networks
(LoRaWAN), devices that combat challenging cyber threats and attacks are of critical …

Integration of LoRaWAN and 4G/5G for the Industrial Internet of Things

J Navarro-Ortiz, S Sendra, P Ameigeiras… - IEEE …, 2018 - ieeexplore.ieee.org
Current forecasts predict that the Industrial Internet of Things will account for about 10 billion
devices by 2020. Simultaneously, unlicensed low-power wide area networks are gaining …

Securely connecting IoT devices with LoRaWAN

A Gladisch, S Rietschel, T Mundt… - 2018 Second World …, 2018 - ieeexplore.ieee.org
IoT devices are usually connected wirelessly to the Internet. Due to the low energy
resources, special new protocols are used. One such protocol is Long Range Wide Area …

Impersonating LoRaWAN gateways using semtech packet forwarder

LS Laufenberg - arXiv preprint arXiv:1904.10728, 2019 - arxiv.org
Low Power Wide Area Network (LPWAN) technologies like the Long Range Wide Area
Network (LoRaWAN) standard provide the foundation of applications realizing …

Formal security analysis of LoRaWAN

M Eldefrawy, I Butun, N Pereira, M Gidlund - Computer Networks, 2019 - Elsevier
Abstract Recent Low Power Wide Area Networks (LPWAN) protocols are receiving
increased attention from industry and academia to offer accessibility for Internet of Things …

Rescuing LoRaWAN 1.0

G Avoine, L Ferreira - Financial Cryptography and Data Security: 22nd …, 2018 - Springer
LoRaWAN is a worldwide deployed IoT security protocol. We provide an extensive analysis
of the version 1.0, which is the currently deployed version, and we show that it suffers from …

Investigation on security risk of LoRaWAN: Compatibility scenarios

S Loukil, LC Fourati, A Nayyar, C So-In - IEEE Access, 2022 - ieeexplore.ieee.org
The LoRaWAN standard comes from the low-power wide area network (LPWAN) technology
suitable for developing Internet of Things (IoT) systems that are poised to disrupt the …