2021
DOI: 10.3390/app11073176
|View full text |Cite
|
Sign up to set email alerts
|

Security Vulnerabilities in LPWANs—An Attack Vector Analysis for the IoT Ecosystem

Abstract: Due to its pervasive nature, the Internet of Things (IoT) is demanding for Low Power Wide Area Networks (LPWAN) since wirelessly connected devices need battery-efficient and long-range communications. Due to its low-cost and high availability (regional/city level scale), this type of network has been widely used in several IoT applications, such as Smart Metering, Smart Grids, Smart Buildings, Intelligent Transportation Systems (ITS), SCADA Systems. By using LPWAN technologies, the IoT devices are less depende… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 42 publications
(17 citation statements)
references
References 95 publications
0
11
0
Order By: Relevance
“…This becomes more important in some IoT categories (Industry 4.0, smart city) and it is a drawback. Therefore, providing a reliable security mechanism based on their limitations is a challenging and open issue task [15,138].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…This becomes more important in some IoT categories (Industry 4.0, smart city) and it is a drawback. Therefore, providing a reliable security mechanism based on their limitations is a challenging and open issue task [15,138].…”
Section: Discussionmentioning
confidence: 99%
“…The information which is collected by IoT and IoT communication signals in LPWAN should be sent securely, otherwise, it can lead to security (disclose sensitive information about environment) and privacy problems (potentially disclose end-node location). Poor authentication and encryption methods can lead to end-node privacy violence [15].…”
mentioning
confidence: 99%
“…A review of vulnerabilities, threats and common defense strategies in some LPWAN protocols, in particular LoRaWAN and SigFox, is performed in [14]. This work discusses critical aspects of security in LPWAN technologies and identifies attack vectors, while also proposing defense strategies to mitigate the identified risks in the context of relevant IoT technologies.…”
Section: Related Workmentioning
confidence: 99%
“…In what follows we detail the results of several studies, which deal with the replay and bit-flipping attacks, and thus are relevant to the scenarios emulated by us. The interested readers can find a more comprehensive overview of the other attack types and challenges in, e.g., [25].…”
Section: Related Workmentioning
confidence: 99%