Filters








1,265 Hits in 2.8 sec

Analysis, design and implementation of secure LoRaWAN sensor networks

Bogdan Oniga, Vasile Dadarlat, Eli De Poorter, Adrian Munteanu
2017 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP)  
In this context, this paper performs an in-depth analysis of the security aspects in LoRaWAN sensor networks. Additionally, a novel secure LoRaWAN network architecture is proposed.  ...  The paper addresses the security concerns of data protection and data privacy in sensor networks that make use of the LoRaWAN (Long-Range Wide Area Network) protocol specification.  ...  ACKNOWLEDGMENT This research has been supported by Fonds Wetenschappelijk Onderzoek (FWO), Vlaanderen (projects G025615 and G084117).  ... 
doi:10.1109/iccp.2017.8117042 dblp:conf/iccp2/OnigaDPM17 fatcat:iiwl5hsu7rcojjaqtftlr2fgbe

Hardware Security in Sensor and its Networks

Mohammad Mezanur Rahman Monjur, Joseph Heacock, Joshua Calzadillas, MD Shaad Mahmud, John Roth, Kunal Mankodiya, Edward Sazonov, Qiaoyan Yu
2022 Frontiers in Sensors  
With its increasing utilization, the functionality and performance of sensor networks and their applications are not the only design aims; security issues in sensor networks attract more and more attentions  ...  Security threats in sensor and its networks could be originated from various sectors: users in cyber space, security-weak protocols, obsolete network infrastructure, low-end physical devices, and global  ...  QUANTITATIVE SECURITY THREAT ANALYSIS Attack Scenarios In this section, we perform quantitative and comprehensive security threat analysis on a sensor network communicated via LoRa technology.  ... 
doi:10.3389/fsens.2022.850056 fatcat:vsp5n4akejbornwtd47xqzlkou

LoRaWAN with HSM as a Security Improvement for Agriculture Applications

Reinhard Kloibhofer, Erwin Kristen, Luca Davoli
2020 Zenodo  
It intro-duces the important LoRaWAN data communication technology for the trans-mission of sensor data and to present a concept for improving data security and protection of sensor nodes.  ...  A real system implementation (Security Evaluation Demonstrator, SED) helps to validate the correctness and the correct function of the advanced security improvement.  ...  Spain, Sweden. 13 Parts of this work were funded by the Austrian Research Promotion Agency (FFG) and BMK (Austrian Federal Ministry for Climate Action, Environment, Energy, Mobility, Innovation and  ... 
doi:10.5281/zenodo.3999636 fatcat:wc7xxfcxnrfczc62oasrg4mvkm

Security Vulnerabilities in LoRaWAN

Xueying Yang, Evgenios Karampatzakis, Christian Doerr, Fernando Kuipers
2018 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)  
Subsequently, we discover and analyze several vulnerabilities of LoRaWAN.  ...  However, given that LoRaWAN is fairly novel, its level of security has not been thoroughly analyzed, which is the main objective of this paper.  ...  The next section will describe the protocol design of LoRaWAN by the standard; the section after this will present the results from our security analysis. III.  ... 
doi:10.1109/iotdi.2018.00022 dblp:conf/iotdi/YangKDK18 fatcat:cl6w43mz3fgftaas34hmdqrwoa

Review of LoRa WAN and its Application

Jitendra Rajendra Rana, MGM's Jawaharlal Nehru Engineering College, Aurangabad
2020 International Journal of Engineering Research and  
IoT applications along with wireless sensors can create useful smart city applications.  ...  At present Bluetooth, ZigBee, Z wave, NFC, RFID, Wi-Fi, LoRaWAN and many more application specific wireless protocol are available in the market. The review latest wireless technology for IoT i.e.  ...  There are some factors which also need to be considered while designing a system using LoRaWAN. ▪ Low Data transfer rate. ▪ Implementation in complex application is unknown. ▪ Sensor and LPWAN VI.  ... 
doi:10.17577/ijertv8is120381 fatcat:wlkvea4sxbgq7nhtmmz6adxbqq

Security Issues and Vulnerability of IoT Devices

Kurdistan Ali, Shavan Askar
2021 Zenodo  
Internet of things is entering in all aspects of life including home, industries, medical care, cars, sensors, but the main and very important open challenges in this area is security issues.  ...  This paper discuss the security aspects in the IoT communication protocols and Security threats of multiple layers dependent on the security concepts of data confidently, data integrity and privacy, it  ...  To achieve this goal, we have to know the basics of IoT and its implementation on the advanced network technologies and applied it within the available networks (e.g. wireless sensors, node-based sensor  ... 
doi:10.5281/zenodo.4497706 fatcat:gwiptsns3jbr3ap6vjxg4e5eji

Survey of LoRa Technology in Agriculture IoT

Sayali Makone
2020 International Journal for Research in Applied Science and Engineering Technology  
Various processors can be used to detect, analyse and process this sensor data. However, it is necessity of the time to get reliable, low cost and effective communication network.  ...  At present Bluetooth, ZigBee, RFID, Wi-Fi, LoRaWAN and many more application specific wireless protocol are available in the market.  ...  The parameters such as network coverage, cost of maintenance, life span of battery, security of network and network range have been discussed thoroughly.  ... 
doi:10.22214/ijraset.2020.30895 fatcat:nw7umxe77vgntkdlvlyr3l2d3y

LoMM: a Monitoring and Management Platform for LoRaWAN Experimentation

Cristina Emilia Costa, Marco Centenaro, Roberto Riggio
2020 Zenodo  
Year after year, Long-Range (LoRa) is globally becoming recognized as a low-power wide-area network technology that enables cheap and easy-to-setup deployments of Internet of things (IoT) networks.  ...  In this paper, we present a novel platform for the monitoring and management of LoRa-based IoT networks called LoMM, whose aim is that of bridging the gap between the research domain and the real deployments  ...  The Commission is not responsible for any use that may be made of the information it contains.  ... 
doi:10.5281/zenodo.4032463 fatcat:z7zkumt3jzfevlu5rf2agdwwre

LoRa WAN for Wind Turbine Monitoring: Prototype and Practical Deployment

Konstantin Mikhaylov, Abdul Moiz, Ari Pouttu, Jose Manuel Martin Rapun, Sergio Ayuso Gascon
2018 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)  
The details of the design and deployment choices, and the results and lessons learned coming from analysis of operation of the deployed system over the ninemonth period are reported.  ...  In the paper we investigate the utility and report our experiences of deploying a prototype wind-turbine monitoring solution based on the recently developed low power wide area network (LPWAN) technology  ...  University of Oulu, and Academy of Finland 6Genesis Flagship (grant 318927).  ... 
doi:10.1109/icumt.2018.8631240 dblp:conf/icumt/MikhaylovMPRG18 fatcat:mellbt76zbgxxi3j2vgx4rp6fi

Communication protocols evaluation for a wireless rainfall monitoring network in an urban area

Lilia Ortega-Gonzalez, Melisa Acosta-Coll, Gabriel Piñeres-Espitia, Shariq Aziz Butt
2021 Heliyon  
To perform the evaluation, a wireless sensor network was designed and characterized for Zigbee and LoRaWAN with Radio Mobile tool taking into account the measurement points implemented with GPRS network  ...  From the results of simulations, LoRaWAN and Zigbee network has similar radio signal received and the LoRaWAN network obtains the least losses per path.  ...  The comparative analysis of the predictions with the results of the measurements and monitoring at the WiMAX network sites, shows a 50% improvement of the network capacity with the implementation and monitoring  ... 
doi:10.1016/j.heliyon.2021.e07353 fatcat:2xbokb5ivbddblo3jieghicrsa

Design and implementation of an automated and decentralized pollution monitoring system with blockchains, smart contracts, and LoRaWAN

Sina Rafati Niya, Sanjiv S. Jha, Thomas Bocek, Burkhard Stiller
2018 NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium  
On the other hand, it is designed to be fully decentralized by using the Ethereum Blockchain to store and retrieve the data recorded by IoT sensors.  ...  Observations on the four different types of sensors for measuring Potential Hydrogen (PH), Turbidity, Carbon monoxide (CO), and Carbon dioxide (CO2), revealed a high accuracy with the expected time-lines  ...  In Sections III and IV design and implementation details of the proposed pollution monitoring system are explained.  ... 
doi:10.1109/noms.2018.8406329 dblp:conf/noms/NiyaJBS18 fatcat:64tp4spuwnhmzakpzoisj3wny4

Enhancing Key Management in LoRaWAN with Permissioned Blockchain

Victor Ribeiro, Raimir Holanda, Alex Ramos, Joel J. P. C. Rodrigues
2020 Sensors  
A secure architecture for key management based on smart contracts and permissioned blockchain to enhance security and availability in LoRaWAN networks is proposed.  ...  Performance analysis shows that the prototype presents similar execution time and latency values, when compared to a traditional system, especially for small and medium-sized LoRaWAN networks.  ...  The security of the remaining LoRaWAN elements (e.g., network server and application server) is out of scope in this paper but a formal security analysis of LoRaWAN can be found in Reference [38] .  ... 
doi:10.3390/s20113068 pmid:32485791 fatcat:kwe7xeopnngx3aduvrryhspf5u

A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol

Shu-Yang Gao, Xiao-Hong Li, Mao-De Ma
2019 Sensors  
If the user's root key is leaked, the wireless sensor network will not be able to prevent malicious nodes from joining the network.  ...  Low power wide area network (LoRaWAN) protocol has been widely used in various fields.  ...  Formal Analysis of SPT and LoRaWAN Scyther [14] is a tool for the automatic verification of security protocols.  ... 
doi:10.3390/s19235122 pmid:31766778 pmcid:PMC6928866 fatcat:z23z5qhj3rabznhlbk2y2wkf7q

Energy-Aware Security Adaptation for Low-Power IoT Applications

Miguel Rosendo, Jorge Granjal
2022 Network  
Such applications will be enabled by a myriad of wireless communication technologies designed for all types of IoT devices, among which are the Long-Range Wide-Area Network (LoRaWAN) or other Low-power  ...  The proposed solution was implemented and experimentally evaluated and was observed to successfully manage security and energy.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/network2010003 fatcat:ncq7a2bkfrcd7beg6jycjgfv2q

On the integration of LoRaWAN with the 5G test network

Rumana Yasmin, Juha Petajajarvi, Konstantin Mikhaylov, Ari Pouttu
2017 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)  
Furthermore, one of the options discussed is implemented in practice and its operation is verified.  ...  At the very same time the development and deployment of the 5th generation of mobile networks (5G) is rolling out.  ...  The acquisition of the hardware for this study has also been partially funded by the ERDF project A71720, 'Big Data for 5G', governed by the HILLA program (www.hilla.center).  ... 
doi:10.1109/pimrc.2017.8292557 dblp:conf/pimrc/YasminPMP17 fatcat:bxqz37gipja3xii7kp6zmvqlqu
« Previous Showing results 1 — 15 out of 1,265 results