Secure-by-construction synthesis of cyber-physical systems

S Liu, A Trivedi, X Yin, M Zamani - Annual Reviews in Control, 2022 - Elsevier
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …

Privacy leakage of LoRaWAN smart parking occupancy sensors

LD Rodić, T Perković, M Škiljo, P Šolić - Future generation computer …, 2023 - Elsevier
Abstract Development of smart cities is enabled by its core concepts of smart and
sustainable mobility, where Low Power Wide Area Network (LPWAN) such as Long Range …

LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation

F Hessel, L Almon, M Hollick - ACM Transactions on Sensor Networks, 2023 - dl.acm.org
The changing vulnerability and threat landscape constantly challenge the security of
wireless communication standards and protocols. For the Internet of Things (IoT), LoRaWAN …

Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures

S Wang, GH Tu, X Lei, T Xie, CY Li, PY Chou… - Proceedings of the 27th …, 2021 - dl.acm.org
More than 150 cellular networks worldwide have rolled out massive IoT services such as
smart metering and environmental monitoring. Such cellular IoT services share the existing …

Zleaks: Passive inference attacks on Zigbee based smart homes

N Shafqat, DJ Dubois, D Choffnes, A Schulman… - … Conference on Applied …, 2022 - Springer
Zigbee is an energy-efficient wireless IoT protocol that is increasingly being deployed in
smart home settings. In this work, we analyze the privacy guarantees of Zigbee protocol …

Privacy attack on IoT: a systematic literature review

LM Zagi, B Aziz - 2020 International Conference on ICT for …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a technology that is a daily necessity for humans. Unfortunately, so
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …

Discovery privacy threats via device de-anonymization in LoRaWAN

P Spadaccino, D Garlisi, F Cuomo, G Pillon… - Computer …, 2022 - Elsevier
Abstract LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for
the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their …

Privacy-preserving pseudonyms for LoRaWAN

S Pélissier, J Aalmoes, AK Mishra, M Cunche… - Proceedings of the 17th …, 2024 - dl.acm.org
LoRaWAN, a widely deployed LPWAN protocol, raises privacy concerns due to metadata
exposure, particularly concerning the exploitation of stable device identifiers. For the first …

Protecting adaptive sampling from information leakage on low-power sensors

T Kannan, H Hoffmann - Proceedings of the 27th ACM International …, 2022 - dl.acm.org
Adaptive sampling is a powerful family of algorithms for managing energy consumption on
low-power sensors. These algorithms use captured measurements to control the sensor's …

Device re-identification in LoRaWAN through messages linkage

S Pélissier, M Cunche, V Roca, D Donsez - Proceedings of the 15th ACM …, 2022 - dl.acm.org
In LoRaWAN networks, devices are identified by two identifiers: a globally unique and stable
one called DevEUI, and an ephemeral and randomly assigned pseudonym called DevAddr …