Oniga et al., 2017 - Google Patents
Analysis, design and implementation of secure LoRaWAN sensor networksOniga et al., 2017
View PDF- Document ID
- 5683345570564332098
- Author
- Oniga B
- Dadarlat V
- De Poorter E
- Munteanu A
- Publication year
- Publication venue
- 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP)
External Links
Snippet
LoRaWAN is a LPWAN (Low Power Wide Area Network) technology used in a large variety of Internet of Things (IoT) applications. The paper addresses the security concerns of data protection and data privacy in sensor networks that make use of the LoRaWAN (Long …
- 238000004458 analytical method 0 title description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Oniga et al. | Analysis, design and implementation of secure LoRaWAN sensor networks | |
Kunal et al. | An overview of cloud‐fog computing: Architectures, applications with security challenges | |
CN110996318B (en) | A security communication access system for intelligent inspection robots in substations | |
Frustaci et al. | Evaluating critical security issues of the IoT world: Present and future challenges | |
Oh et al. | Security requirements analysis for the IoT | |
Cynthia et al. | Security protocols for IoT | |
Alcaraz et al. | Critical control system protection in the 21st century | |
Masoodi et al. | Security & privacy threats, attacks and countermeasures in Internet of Things | |
Bello et al. | On sustained zero trust conceptualization security for mobile core networks in 5g and beyond | |
Özalp et al. | Layer-based examination of cyber-attacks in IoT | |
Liyanage et al. | Enhancing security of software defined mobile networks | |
Skowyra et al. | Have no phear: Networks without identifiers | |
Rizzardi et al. | Analysis on functionalities and security features of Internet of Things related protocols | |
CN113422768B (en) | Application access method and device in zero trust and computing equipment | |
Mahyoub et al. | Security analysis of critical 5g interfaces | |
Oniga et al. | A secure LoRaWAN sensor network architecture | |
Lei et al. | SecWIR: Securing smart home IoT communications via wi-fi routers with embedded intelligence | |
Saeed et al. | Data-driven techniques and security issues in wireless networks | |
Bouras et al. | Teaching network security in mobile 5G using ONOS SDN controller | |
Millar | IoT security challenges and mitigations: An introduction | |
Ihita et al. | Security for oneM2M-based smart city network: An OM2M implementation | |
Bhoi et al. | Exploring the security landscape: a comprehensive analysis of vulnerabilities, challenges, and findings in Internet Of Things (Iot) application layer protocols | |
Benslimane et al. | Security mechanisms for 6LoWPAN network in context of internet of things: A Survey | |
Skorpil et al. | Internet of things security overview and practical demonstration | |
Millar | Network security issues in the Internet of Things (IoT) |