Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme

J Qadir, I Butun, P Gastaldo, O Aiello… - IEEE Access, 2023 - ieeexplore.ieee.org
Owing to the geographically scattered end devices (EDs) in long-range wide area networks
(LoRaWAN), devices that combat challenging cyber threats and attacks are of critical …

LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation

F Hessel, L Almon, M Hollick - ACM Transactions on Sensor Networks, 2023 - dl.acm.org
The changing vulnerability and threat landscape constantly challenge the security of
wireless communication standards and protocols. For the Internet of Things (IoT), LoRaWAN …

A Comprehensive Systematic Survey of IoT Protocols: Implications for Data Quality and Performance

A Saleem, S Shah, H Iftikhar, J Zywiołek… - IEEE Access, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has revolutionized both professional and personal spheres by
enabling the widespread adoption of real-time applications and seamless data transmission …

Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things

S Windarta, S Suryadi, K Ramli, AA Lestari… - IEEE …, 2023 - ieeexplore.ieee.org
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …

A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators

S Puckett, J Liu, SM Yoo… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Long-range wide-area network (LoRaWAN) is a low-power wide-area network (LP-WAN)
protocol developed for low-bandwidth, battery-operated long-range sensors. However, the …

A novel session key update scheme for LoRaWAN

N Hayati, S Windarta, M Suryanegara… - IEEE …, 2022 - ieeexplore.ieee.org
This paper proposes a novel Long-range Wide Area Network (LoRaWAN) session key
updating scheme to enhance the security of LoRaWAN with cost-effective communication …

A Lightweight Authentication Scheme for LoRaWAN Nodes Represented as On-Chain Non-Fungible Tokens

M Sidorov, JH Khor, ACH Wong, YY Lee… - IEEE Sensors …, 2024 - ieeexplore.ieee.org
QR codes, near-field communication (NFC), and radio frequency identification (RFID) tags
have been widely used for supply chain tracking purposes. By binding valuable physical …

Enhancing LoRaWAN Security: An Advanced AES-Based Cryptographic Approach

S Abboud, N Abdoun - IEEE Access, 2023 - ieeexplore.ieee.org
The unique set of LoRaWAN design prerequisites, which include low power consumption,
cost-effectiveness, and high scalability, requires its security protocols to be equally robust …

Digital signature method to overcome sniffing attacks on LoRaWAN network

RI Lestari, V Suryani, AA Wardhana - International journal of electrical …, 2022 - hrcak.srce.hr
Sažetak LoRa or Long Range with LoRaWAN technology is a protocol for low-power
wireless networks. The absence of an encryption process on the data payload becomes a …

Cybersecurity in LoRaWAN Networks: Vulnerability Analysis and Enhancing Security Measures for IoT Connectivity

J Qadir - 2024 - tesidottorato.depositolegale.it
Abstract The realm of Low Power Wide Area Network (LPWAN) has a paramount influence
on the way we work and live. For instance, real-time applications and rapid packet transiting …