[go: up one dir, main page]

Oniga et al., 2017 - Google Patents

Analysis, design and implementation of secure LoRaWAN sensor networks

Oniga et al., 2017

View PDF
Document ID
5683345570564332098
Author
Oniga B
Dadarlat V
De Poorter E
Munteanu A
Publication year
Publication venue
2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP)

External Links

Snippet

LoRaWAN is a LPWAN (Low Power Wide Area Network) technology used in a large variety of Internet of Things (IoT) applications. The paper addresses the security concerns of data protection and data privacy in sensor networks that make use of the LoRaWAN (Long …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Oniga et al. Analysis, design and implementation of secure LoRaWAN sensor networks
Kunal et al. An overview of cloud‐fog computing: Architectures, applications with security challenges
CN110996318B (en) A security communication access system for intelligent inspection robots in substations
Frustaci et al. Evaluating critical security issues of the IoT world: Present and future challenges
Oh et al. Security requirements analysis for the IoT
Cynthia et al. Security protocols for IoT
Alcaraz et al. Critical control system protection in the 21st century
Masoodi et al. Security & privacy threats, attacks and countermeasures in Internet of Things
Bello et al. On sustained zero trust conceptualization security for mobile core networks in 5g and beyond
Özalp et al. Layer-based examination of cyber-attacks in IoT
Liyanage et al. Enhancing security of software defined mobile networks
Skowyra et al. Have no phear: Networks without identifiers
Rizzardi et al. Analysis on functionalities and security features of Internet of Things related protocols
CN113422768B (en) Application access method and device in zero trust and computing equipment
Mahyoub et al. Security analysis of critical 5g interfaces
Oniga et al. A secure LoRaWAN sensor network architecture
Lei et al. SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence
Saeed et al. Data-driven techniques and security issues in wireless networks
Bouras et al. Teaching network security in mobile 5G using ONOS SDN controller
Millar IoT security challenges and mitigations: An introduction
Ihita et al. Security for oneM2M-based smart city network: An OM2M implementation
Bhoi et al. Exploring the security landscape: a comprehensive analysis of vulnerabilities, challenges, and findings in Internet Of Things (Iot) application layer protocols
Benslimane et al. Security mechanisms for 6LoWPAN network in context of internet of things: A Survey
Skorpil et al. Internet of things security overview and practical demonstration
Millar Network security issues in the Internet of Things (IoT)