2017 Ieee Sensors 2017
DOI: 10.1109/icsens.2017.8233990
|View full text |Cite
|
Sign up to set email alerts
|

A secure LoRaWAN sensor network architecture

Abstract: Abstract-A novel secure architecture for sensor networks that make use of the LoRaWAN (Long-Range Wide Area Network) protocol specification is proposed in this paper. The paper analyses potential security threats and provides the protection mechanisms and security recommendations to enable protected data transmission and to prevent unauthorized access and data loss in LoRaWAN sensor networks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…In this chapter, we learned that Security on the LoRaWAN server has two core parameters: NwkSKey and AppSKey [38]. In LoRaWAN Server v.1.0.3, the architecture of the security system is shown in Figure 3.…”
Section: Architecture and Flowchart Of Lorawan Securitymentioning
confidence: 99%
“…In this chapter, we learned that Security on the LoRaWAN server has two core parameters: NwkSKey and AppSKey [38]. In LoRaWAN Server v.1.0.3, the architecture of the security system is shown in Figure 3.…”
Section: Architecture and Flowchart Of Lorawan Securitymentioning
confidence: 99%
“…The architecture in [6] considers the usage of a Public-Key Infrastructure (PKI), employed to issue a certificate for all network entities supporting secure communications. Communications are secure in terms of integrity and confidentiality, while a set of other security-related mechanisms are proposed to secure communications in the network, such as VPN, firewalls and SSH.…”
Section: Related Workmentioning
confidence: 99%
“…Besides, they also presented dynamic encryption key and D-Box update procedure to enhance end-to-end security level. Oniga et al [25] analyzed potential security threats of LoRaWAN and implemented a public key infrastructure model, in which each component held a certificate with which to communicate with relevant entities in the network, so as to protect data transmitted over the network and to establish strong defence in such networks.…”
Section: Related Studiesmentioning
confidence: 99%