“…The current LoRaWAN protocol has room to build physical layer-based attacks, such as building a covert channel over LoRa PHY [85], [86]. LoRaWAN vulnerabilities, such as replay attack [87], sniffers [88]- [90], jamming [91]- [95], key extraction [58], [96], [97], and energy attacks [98] must be addressed. Such attacks can lead to data breaches, financial losses, and even the interruption of critical services.…”