2020
DOI: 10.3390/s20205800
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on the Security of Low Power Wide Area Networks: Threats, Challenges, and Potential Solutions

Abstract: Low power wide area network (LPWAN) is among the fastest growing networks in Internet of Things (IoT) technologies. Owing to varieties of outstanding features which include long range communication and low power consumption, LPWANs are fast becoming the most widely deployed connectivity standards in IoT domain. However, this promising network are exposed to various security and privacy threats and challenges. For reliable connectivity within networks, the security and privacy challenges need to be effectively … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 77 publications
0
12
0
Order By: Relevance
“…Authenticity and integrity in LoRaWAN are satisfied by design using two session keys encrypted with 128-bit AES. Each packet encrypted with AES-CTR carries a frame counter (to prevent packet replication) and a message integrity code computed with AES-CMAC (to prevent packet tampering) [ 57 , 58 ]. The cellular network, from 3G onwards and using the 3GPP protocol, guarantees data integrity and allows secure authentication thanks to its three main components: user equipment, a mobile management entity, and a home-subscriber server [ 59 ].…”
Section: Discussionmentioning
confidence: 99%
“…Authenticity and integrity in LoRaWAN are satisfied by design using two session keys encrypted with 128-bit AES. Each packet encrypted with AES-CTR carries a frame counter (to prevent packet replication) and a message integrity code computed with AES-CMAC (to prevent packet tampering) [ 57 , 58 ]. The cellular network, from 3G onwards and using the 3GPP protocol, guarantees data integrity and allows secure authentication thanks to its three main components: user equipment, a mobile management entity, and a home-subscriber server [ 59 ].…”
Section: Discussionmentioning
confidence: 99%
“…Basu et al [23] discusses about various security issues of Low Power Wide Area Networks in the context of LoRa networks in their survey paper. Another similar kind of survey on security of Low Power Wide Area Networks, its threats, challenges, and potential solutions are done by Adefemi Alimi et al [24]. Iqbal et al [25] addresses numerous security and authenticity problems involved with the SCADA system for LoRa-based wireless communication.…”
Section: Related Workmentioning
confidence: 99%
“…A denial of service (DoS) attack can be described as an attempt by malicious attackers to consume network resources or bandwidth by temporarily or indefinitely disrupting the network services of a computer or any devices connected to a network [12]. They are the most common and dangerous cyberattack against IoT devices which leads IoT systems to total shut down [19].…”
Section: Overview Of Denial-of-service (Dos) Attackmentioning
confidence: 99%
“…The extensive deployment of IoT devices in an open environment has exposed the networks to various cyberattacks and security threats [10]. Numerous cyberattacks such as replay, wormhole, Sybil, man-in-the-middle (MITM), denial of service (DoS), side-channel, etc., have continued to be a menace [11][12][13]. Hence, it is important to develop an effective security measure that can constantly and urgently learn and detect attacks such as DoS attacks in IoT networks.…”
Section: Introductionmentioning
confidence: 99%