Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access - MobiWac'18 2018
DOI: 10.1145/3265863.3265882
|View full text |Cite
|
Sign up to set email alerts
|

General Security Considerations of LoRaWAN Version 1.1 Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…However, there is no reference to know the current extent of usage of the LoRa devices that comply with LoRaWAN v.1.1 and their network deployment scenarios. It remains a faulty key-management issue for LoRaWAN v.1.0 end nodes until the hardware is not replaced completely [35].…”
Section: B Lorawan and Unique Security Threatsmentioning
confidence: 99%
“…However, there is no reference to know the current extent of usage of the LoRa devices that comply with LoRaWAN v.1.1 and their network deployment scenarios. It remains a faulty key-management issue for LoRaWAN v.1.0 end nodes until the hardware is not replaced completely [35].…”
Section: B Lorawan and Unique Security Threatsmentioning
confidence: 99%
“…In LPWANs, especially for LoRa, security is a major concern. In the literature, several works have exposed the susceptibility of LoRa to attacks, in the phases of key management, network connection, and communications [3][4][5][6]. Although many security improvements have been added to the architecture of LoRa in more recent specifications, much work still needs to be done in this regard.…”
Section: Introductionmentioning
confidence: 99%