2021
DOI: 10.1109/jsyst.2020.3015274
|View full text |Cite
|
Sign up to set email alerts
|

Improving Redundancy in LoRaWAN for Mixed-Criticality Scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…A key to the solution of the exploration-exploitation trade-off in CAPL is the criticality for control. There exist substantial studies to improve industrial system performance by applying the conventional concept of criticality in the IWSAN [10], [11], [12], [13]. The existing studies on the so-called mixed-criticality IWSAN assign the type-dependent criticality to each flow or traffic that occurs in an environment, where several types of applications coexist.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A key to the solution of the exploration-exploitation trade-off in CAPL is the criticality for control. There exist substantial studies to improve industrial system performance by applying the conventional concept of criticality in the IWSAN [10], [11], [12], [13]. The existing studies on the so-called mixed-criticality IWSAN assign the type-dependent criticality to each flow or traffic that occurs in an environment, where several types of applications coexist.…”
Section: Related Workmentioning
confidence: 99%
“…For example, system mode change schemes based on network conditions are proposed in [10] and [11] to guarantee the requirements of high-criticality traffic or flow. Moreover, the criticality-based MAC protocols are proposed in [12] and [13], which classify traffic in the IWSAN into three categories: safety, control, and monitoring. However, these studies determined the level of criticality considering the characteristics of the traffic type.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They utilized message replay and checkpoint-based mechanisms to make client-edge-server systems more tolerant to edge failures and client mobility. Carvalho et al [66] implement a replication mechanism LoRa-REP for replicating critical messages on LoraWAN by sending them at different SF and improving redundancy in LoRaWAN for mixed-criticality scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…Also, the current key updating scheme is not clearly defined [ 7 ]. Key back-up, recovery, revocation, and handling of backward compatibility issues [ 21 , 22 , 23 , 24 ] are existed in the current version. Those issues make the key management security framework vulnerable.…”
Section: Introductionmentioning
confidence: 99%