2017 International Conference on Information Networking (ICOIN) 2017
DOI: 10.1109/icoin.2017.7899535
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of object tracking system based on LoRa

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 3 publications
0
12
0
Order By: Relevance
“…Regarding traceability purposes, this low power WAN has been used in previous work like in Zinas et al (2017) where the authors implemented a LoRaWAN architecture for long-range communication and cattle tracking, including the design and development of the application and protocol. It has also been suggested in Kim et al (2017) that LoRaWAN is an effective way of capturing an object’s traceability when the paper applied it to develop a bicycle location tracking and management system. NB-IoT is a ‘narrow-band LPWAN technology which can coexist in LTE or GSM under licensed frequency bands’ (Mekki et al, 2018).…”
Section: Iot Solutions For Ce and Traceabilitymentioning
confidence: 99%
“…Regarding traceability purposes, this low power WAN has been used in previous work like in Zinas et al (2017) where the authors implemented a LoRaWAN architecture for long-range communication and cattle tracking, including the design and development of the application and protocol. It has also been suggested in Kim et al (2017) that LoRaWAN is an effective way of capturing an object’s traceability when the paper applied it to develop a bicycle location tracking and management system. NB-IoT is a ‘narrow-band LPWAN technology which can coexist in LTE or GSM under licensed frequency bands’ (Mekki et al, 2018).…”
Section: Iot Solutions For Ce and Traceabilitymentioning
confidence: 99%
“…Though we have used a secure communication channel and ECDLP based secure session and public keys for ESOTP for secure communication using the communication model described in the previous subsection, it must be considered that a situation where the ESOTP has to work in an insecure channel which is wholly controlled by an adversary 풜 for communication and the messages transmitted among the participating entities can be compromised. Considering this situation, the de‐facto standard model, Dolav‐Yao (DY) treat model, 31,45 is signified for ESOTP scheme that is generally used to analyze the authentication as well as various key management schemes 3,4,12,16–38 discussed in “Literature Review” section. Moreover, some more threats are considered keeping in mind that the adversary 풜 can perform following additional activities.…”
Section: Different Models Used In Esotp Schemementioning
confidence: 99%
“…In 2017, Kim et al 19 proposed a network called “LoRa” for tracking and communicating the objects that works on low power wide area network (LPWAN) technology. The LPWAN technology is generally is implemented based on low range and low power communication technology such as RoLaWAN which is a special type of mobile radio communication and low power broadband coverage network.…”
Section: Introductionmentioning
confidence: 99%
“…Other use cases normally considered to be uplink only such as collecting sensor readings can still benefit from downlink traffic capability. The use of groupcasting and geocasting, [30], can be an effective way of reducing traffic by specifying which nodes should transmit data whilst the rest can remain in sleep modes. In this manner, downlink traffic can be used to improve network performance and only the data that has high value will be transmitted and stored.…”
Section: E Common Requirementsmentioning
confidence: 99%