A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Security Vulnerabilities in LoRaWAN
2018
2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)
LoRaWAN is a MAC-layer protocol for long-range low-power communication. Since its release in 2015, it has experienced a rapid adoption in the field of Internet-of-Things (IoT). However, given that LoRaWAN is fairly novel, its level of security has not been thoroughly analyzed, which is the main objective of this paper. We highlight the security features present in LoRaWAN, namely activation methods, key management, cryptography, counter management, and message acknowledgement. Subsequently, we
doi:10.1109/iotdi.2018.00022
dblp:conf/iotdi/YangKDK18
fatcat:cl6w43mz3fgftaas34hmdqrwoa