2019
DOI: 10.1016/j.procir.2019.02.022
|View full text |Cite
|
Sign up to set email alerts
|

VR training model for exploiting security in LPWAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Kun-Lin et al [10] designed a system that provides the security architecture for LoRaWANs with data encryption with AES encryption. Liagkou et al [11] built a model to develop secure LPWANs with virtual reality. Sung et al [12] created a secure location environment for IoT systems based on calculations with multiple sensors.…”
Section: Related Workmentioning
confidence: 99%
“…Kun-Lin et al [10] designed a system that provides the security architecture for LoRaWANs with data encryption with AES encryption. Liagkou et al [11] built a model to develop secure LPWANs with virtual reality. Sung et al [12] created a secure location environment for IoT systems based on calculations with multiple sensors.…”
Section: Related Workmentioning
confidence: 99%
“…The EEPROMs are highly vulnerable to various attacks such as side-channel attacks. Addressing the issue of key storage, the authors in [ 95 ] explained that if the application server that holds all the secret key is compromised, the communication between the entire nodes in the network can be compromised. In order to ensure that secured communication within the networks is achieved, adequate security measures such as proper and fast encryption, authentication measures, tamper proofing, and secure elements (SEs) are some of the methods to be considered.…”
Section: Research Challenges and Recommendations For Future Workmentioning
confidence: 99%