kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Review of Security Vulnerabilities in LoRaWAN
Department of Electrical, Electronic and Telecommunications Engineering and Naval Architecture (DITEN), University of Genoa, 16145, Genoa, Italy.
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0002-1723-5741
Department of Electrical, Electronic and Telecommunications Engineering and Naval Architecture (DITEN), University of Genoa, 16145, Genoa, Italy.
Department of Electrical, Electronic and Telecommunications Engineering and Naval Architecture (DITEN), University of Genoa, 16145, Genoa, Italy.
2023 (English)In: Applications in Electronics Pervading Industry, Environment and Society - APPLEPIES 2022, Springer Nature , 2023, p. 248-254Conference paper, Published paper (Refereed)
Abstract [en]

The realm of Low Power Wide Area Network (LPWAN) has a paramount influence on the way we work and live. For instance, real-time applications and rapid packet transiting for long-range have now come into practice that was previously considered mysterious. However, euphoria becomes a problem when it comes to security considerations, as low-power devices possess limited processing units that are unable to elucidate robust security algorithms. In this case, the Low Power Wide Area Network (LoRaWAN) stepped into a technological competition that filled the gap by adopting the end-to-end security feature. Though, LoRaWAN protocol entails fundamental security requirements but the implementation matters. This paper presents security analyses in the LoRaWAN networks. In addition, we provide a bibliometric overview of security considerations in LoRaWAN that helps researchers for thorough insights and implementation.

Place, publisher, year, edition, pages
Springer Nature , 2023. p. 248-254
Keywords [en]
Authenticity, Bibliometric, Confidentiality, Integrity, IoT, LoRaWAN, Security, Vulnerability
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-338615DOI: 10.1007/978-3-031-30333-3_33Scopus ID: 2-s2.0-85161467907OAI: oai:DiVA.org:kth-338615DiVA, id: diva2:1809799
Conference
International Conference on Applications in Electronics Pervading Industry, Environment and Society, APPLEPIES 2022, Genoa, Italy, Sep 26 2022 - Sep 27 2022
Note

Part of ISBN 9783031303326

QC 20231106

Available from: 2023-11-06 Created: 2023-11-06 Last updated: 2023-11-06Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Butun, Ismail

Search in DiVA

By author/editor
Butun, Ismail
By organisation
Network and Systems Engineering
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 43 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf