2023
DOI: 10.3390/s23042078
|View full text |Cite
|
Sign up to set email alerts
|

LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution

Abstract: Low-power wide area network (LPWAN) technologies such as IQRF are becoming increasingly popular for a variety of Internet of Things (IoT) applications, including smart cities, industrial control, and home automation. However, LPWANs are vulnerable to cyber attacks that can disrupt the normal operation of the network or compromise sensitive information. Therefore, analyzing cybersecurity risks before deploying an LPWAN is essential, as it helps identify potential vulnerabilities and threats as well as allowing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 42 publications
(50 reference statements)
0
2
0
Order By: Relevance
“…The wireless sensor network of IoT exhibits vulnerabilities across various layers, and cyberattacks can manifest at different stages [66]. Likewise, LPWAN is not exempt from cyber threats [67]. Wireless sensor networks in smart grids comprise IoT devices equipped with temperature, humidity, light, and wind sensors.…”
Section: Security Considerationsmentioning
confidence: 99%
“…The wireless sensor network of IoT exhibits vulnerabilities across various layers, and cyberattacks can manifest at different stages [66]. Likewise, LPWAN is not exempt from cyber threats [67]. Wireless sensor networks in smart grids comprise IoT devices equipped with temperature, humidity, light, and wind sensors.…”
Section: Security Considerationsmentioning
confidence: 99%
“…Since industrial control protocol information can directly or indirectly transmit the operation status or operation of industrial software, there are potential safety risks. The development of informatization has led to the interconnection of IT/OT networks, simplifying the digital operation process, and inevitably creating vulnerabilities that are vulnerable to attacks, posing more threats to the system [5]. Attacks against industrial control protocols and traditional industrial software security vulnerabilities have made industrial production and manufacturing the target of numerous attackers.…”
Section: Introductionmentioning
confidence: 99%