“…IoT [2] (full overview), [5] (definitions and characterization), [10] (IIoT full overview), [38] (full overview with focus on specific vertical), [87] (security aspects), [99] (Blockchain applicability), [100] (Blockchain applicability), [101] (technologies & verticals), [102] (DT full overview), [103] (DT full overview), [104] (DT full overview), [105] (DT full overview), [106] (IIoT edge computing), [107] (IIoT security aspects) WSN [24] (full overview), [97] (WSN evaluation methodology) LPWAN [13] (LoRa & Sigfox comparison), [15] (comparison, verticals, research challenges), [16] (design considerations, comparison, research challenges), [17] (LoRa & NB-IoT comparison), [18] (overview, comparison, research challenges), [19] (Sigfox, LoRaWAN & NB-IoT comparison), [20] (LoRaWAN, DASH7 & NB-IoT comparison and mobility support), [21] (verticals, comparison), [22] (full overview), [45] (ISM LPWAN security aspects) LoRa/LoRaWAN [79] (ADR algorithm), [82] (LR-FHSS), [85] (LoRaWAN v1.1 security aspects), [91] (LoRa research challenges), [92] (LoRaWAN full overview), [98] (LoRa research challenges), [108] (full overview), [109] (LoRaWAN full overview), [110] (LoRaWAN simulators)…”