2021
DOI: 10.1007/s42452-021-04377-y
|View full text |Cite
|
Sign up to set email alerts
|

Implementing cryptography in LoRa based communication devices for unmanned ground vehicle applications

Abstract: In this study, a Long Range (LoRa) based bidirectional secured communication link for controlling and monitoring the robots from a remote location is proposed. The security features and structure of the LoRa is build upon the standard protocol called LoRa wide area networks (LoRaWAN). To take advantage of these features, LoRa devices/end modules need to be connected to a network server through a LoRa gateway. However, for certain military scenarios like war zones, terrorist attack sites, disaster sites etc., t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 21 publications
0
6
0
2
Order By: Relevance
“…At the early stages of digitalization in the power sector, additional security measures linked to physical communication protocols are required to ensure the safety of smart meters and other IoT devices [26]. Furthermore, the remainder of the broader value chain of power markets and systems includes several extremely volatile components that must be secured by cybersecurity measures.…”
Section: Privacy and Cybersecurity Aspects Of Digital Energy Platformsmentioning
confidence: 99%
“…At the early stages of digitalization in the power sector, additional security measures linked to physical communication protocols are required to ensure the safety of smart meters and other IoT devices [26]. Furthermore, the remainder of the broader value chain of power markets and systems includes several extremely volatile components that must be secured by cybersecurity measures.…”
Section: Privacy and Cybersecurity Aspects Of Digital Energy Platformsmentioning
confidence: 99%
“…Therefore, the standard Lo-RaWAN® protocol's security features might not be accessible. Manuel et al [26] proposed a cryptography protocol that can be used with LoRa end devices to ensure confidentiality, integrity, and authenticity (CIA) of data. This cryptography protocol has been used in this work as a security feature for ensuring data security.…”
Section: B Lpwan and Lora Backgroundmentioning
confidence: 99%
“…The set of algorithms discussed below enables the coordination of Rescuer from the base station. All data communicated between the base station and the robot are secured using our earlier cryptography protocol discussed in [26].…”
Section: Software Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…It is very economical to be used by armed forces as it consumes rudimentary power for transmission of signals and for communication purpose at a low data rate and at higher coverage area [6] .This helps the individual armed forces to avoid the usage of cellular network which not only consumes a lot of power for transmission but also the rate of drainage of stored charge in battery is more compared to LoRa network at the cost of sacrificing higher data rate which is absent in our proposed methodology as we used LoRa WAN. Its coverage area as mentioned is in range of kilometers [7]. Transmission is bidirectional in nature with transmission and reception of signals that are done simultaneously between armed force section and the base station section .Its extensible range of transmission makes it suitable to be used at armed forces and military land based industry .It uses gateway nodes which acts as a intermediary nodes for transmission at very long distance.…”
Section: Lorawanmentioning
confidence: 99%