2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI) 2018
DOI: 10.1109/saci.2018.8440945
|View full text |Cite
|
Sign up to set email alerts
|

Security Survey of Dedicated IoT Networks in the Unlicensed ISM Bands

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 7 publications
0
17
0
Order By: Relevance
“…STRIDE provides a basis or checklist for classes of potential types of threats to consider at each vulnerable point. The majority are well known in existing literature [ 1 , 35 , 36 ](bearing in mind that these tend to grow fast with time). Others may be visualised as part of the procedure.…”
Section: Phase I: System Design For Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…STRIDE provides a basis or checklist for classes of potential types of threats to consider at each vulnerable point. The majority are well known in existing literature [ 1 , 35 , 36 ](bearing in mind that these tend to grow fast with time). Others may be visualised as part of the procedure.…”
Section: Phase I: System Design For Securitymentioning
confidence: 99%
“…Recent developments in sensor networks and the need for smart meters, automated home devices and smart cities have led to the rise in the development of IoT technology-enabling devices to be connected and communicating with each other [ 1 ]. Communication between the IoT devices and smart hub is usually wireless and is connected to a network and the Internet via a traditional wireless router.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A detailed and extensive study on security aspects of LoRaWAN 1.1 is presented in [7], however the authors did not employ a test-bed with real hardware. As far as Sigfox or NB-IoT is concerned, their security issues are only briefly mentioned in [8] and [9]. The authors of [9] attempt to provide an overview of security issues in LPWAN networks (LoRaWAN, NB-IoT, Sigfox, DASH7), however the analysis provided is very superficial and no results from hands-on experiments are presented.…”
Section: Related Work and Contributionsmentioning
confidence: 99%
“…are some of the methodology proposed in the literature. The threats, effects and impacts of LPWAN security menaces have been extensively discussed in numerous studies [ 15 , 16 , 17 , 18 ]. To mitigate the growing IoT and LPWAN security challenges, numerous security solutions such as intrusion detection systems (IDSs), key management and encryption schemes have been proposed in the literature [ 19 , 20 , 21 , 22 ].…”
Section: Introductionmentioning
confidence: 99%