2020
DOI: 10.1049/iet-ifs.2019.0447
|View full text |Cite
|
Sign up to set email alerts
|

IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN

Abstract: Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low computation power, low battery life and low memory. As incorporating security features are resource expensive, IoT devices are often found to be less protected and in recent times, more IoT devices have been routinely attacked due to high profile security flaws.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 21 publications
0
16
0
Order By: Relevance
“…Different sensors and interfaces are incorporated and designed for a specific purpose and each sensor's activity needs to be engaged when and where it is appropriate. In addition, during interaction with the user, these sensors and interfaces of the robotic system need to be in sync and engage with the relevant and complementary IoT home and ambient sensors to optimise performance and avoid any possibility of information leakage to unintended individuals, while the vulnerabilities of lightweight limited-resource IoT sensors should be protected [73].…”
Section: Discussionmentioning
confidence: 99%
“…Different sensors and interfaces are incorporated and designed for a specific purpose and each sensor's activity needs to be engaged when and where it is appropriate. In addition, during interaction with the user, these sensors and interfaces of the robotic system need to be in sync and engage with the relevant and complementary IoT home and ambient sensors to optimise performance and avoid any possibility of information leakage to unintended individuals, while the vulnerabilities of lightweight limited-resource IoT sensors should be protected [73].…”
Section: Discussionmentioning
confidence: 99%
“…Also in [ 162 ], the study provides an IoT security analysis, where it examines the potential threats and identifies the countermeasures and their limitations paying an attention to the mechanisms of security of the IoT protocol. The work of [ 163 ] outlines and discusses the general attacks that can plague the IoT devices and networks. It then evaluates LoRaWAN’s security mechanisms, and whether that security can be effectively compromised.…”
Section: Challenges and Open Issuesmentioning
confidence: 99%
“…When all processes are merged to be distributed via the IoT gateway, this procedure causes network jamming due to inconsistent data delivery at the network ends. Fogs can help these IoT gateways through a similar time-based priority mechanism in terms of data delivery [3], [4].…”
Section: Introductionmentioning
confidence: 99%