2021 IEEE International Symposium on Technologies for Homeland Security (HST) 2021
DOI: 10.1109/hst53381.2021.9619847
|View full text |Cite
|
Sign up to set email alerts
|

An Attack Analysis Framework for LoRaWAN applied Advanced Manufacturing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…The current LoRaWAN protocol has room to build physical layer-based attacks, such as building a covert channel over LoRa PHY [85], [86]. LoRaWAN vulnerabilities, such as replay attack [87], sniffers [88]- [90], jamming [91]- [95], key extraction [58], [96], [97], and energy attacks [98] must be addressed. Such attacks can lead to data breaches, financial losses, and even the interruption of critical services.…”
Section: B Mac Layermentioning
confidence: 99%
“…The current LoRaWAN protocol has room to build physical layer-based attacks, such as building a covert channel over LoRa PHY [85], [86]. LoRaWAN vulnerabilities, such as replay attack [87], sniffers [88]- [90], jamming [91]- [95], key extraction [58], [96], [97], and energy attacks [98] must be addressed. Such attacks can lead to data breaches, financial losses, and even the interruption of critical services.…”
Section: B Mac Layermentioning
confidence: 99%