Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme
Owing to the geographically scattered end devices (EDs) in long-range wide area networks
(LoRaWAN), devices that combat challenging cyber threats and attacks are of critical …
(LoRaWAN), devices that combat challenging cyber threats and attacks are of critical …
LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation
The changing vulnerability and threat landscape constantly challenge the security of
wireless communication standards and protocols. For the Internet of Things (IoT), LoRaWAN …
wireless communication standards and protocols. For the Internet of Things (IoT), LoRaWAN …
A Comprehensive Systematic Survey of IoT Protocols: Implications for Data Quality and Performance
A Saleem, S Shah, H Iftikhar, J Zywiołek… - IEEE Access, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has revolutionized both professional and personal spheres by
enabling the widespread adoption of real-time applications and seamless data transmission …
enabling the widespread adoption of real-time applications and seamless data transmission …
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …
A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators
S Puckett, J Liu, SM Yoo… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Long-range wide-area network (LoRaWAN) is a low-power wide-area network (LP-WAN)
protocol developed for low-bandwidth, battery-operated long-range sensors. However, the …
protocol developed for low-bandwidth, battery-operated long-range sensors. However, the …
A novel session key update scheme for LoRaWAN
This paper proposes a novel Long-range Wide Area Network (LoRaWAN) session key
updating scheme to enhance the security of LoRaWAN with cost-effective communication …
updating scheme to enhance the security of LoRaWAN with cost-effective communication …
A Lightweight Authentication Scheme for LoRaWAN Nodes Represented as On-Chain Non-Fungible Tokens
QR codes, near-field communication (NFC), and radio frequency identification (RFID) tags
have been widely used for supply chain tracking purposes. By binding valuable physical …
have been widely used for supply chain tracking purposes. By binding valuable physical …
Enhancing LoRaWAN Security: An Advanced AES-Based Cryptographic Approach
S Abboud, N Abdoun - IEEE Access, 2023 - ieeexplore.ieee.org
The unique set of LoRaWAN design prerequisites, which include low power consumption,
cost-effectiveness, and high scalability, requires its security protocols to be equally robust …
cost-effectiveness, and high scalability, requires its security protocols to be equally robust …
Digital signature method to overcome sniffing attacks on LoRaWAN network
RI Lestari, V Suryani, AA Wardhana - International journal of electrical …, 2022 - hrcak.srce.hr
Sažetak LoRa or Long Range with LoRaWAN technology is a protocol for low-power
wireless networks. The absence of an encryption process on the data payload becomes a …
wireless networks. The absence of an encryption process on the data payload becomes a …
Cybersecurity in LoRaWAN Networks: Vulnerability Analysis and Enhancing Security Measures for IoT Connectivity
J Qadir - 2024 - tesidottorato.depositolegale.it
Abstract The realm of Low Power Wide Area Network (LPWAN) has a paramount influence
on the way we work and live. For instance, real-time applications and rapid packet transiting …
on the way we work and live. For instance, real-time applications and rapid packet transiting …