2022
DOI: 10.1007/s11227-022-04534-z
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging data aggregation algorithm in LoRa networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…LPWAN can be realized by implementing upcoming technologies such as Sigfox, Lora, and NB-IoT [4,5]. Though LPWAN systems offer many desired qualities, security and privacy issues have been a significant obstacle to their widespread use [6][7][8]. LPWAN vulnerabilities to threats and intrusion have continued to increase geometrically because of the devices in the network's heterogeneity and ease of accessibility [6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…LPWAN can be realized by implementing upcoming technologies such as Sigfox, Lora, and NB-IoT [4,5]. Though LPWAN systems offer many desired qualities, security and privacy issues have been a significant obstacle to their widespread use [6][7][8]. LPWAN vulnerabilities to threats and intrusion have continued to increase geometrically because of the devices in the network's heterogeneity and ease of accessibility [6].…”
Section: Introductionmentioning
confidence: 99%
“…In solving the challenge of block encryption methods, chain encryption methods can be used. Chain ciphers hide the message pattern by creating a dependency between the blocks in the cipher sequence and guaranteeing the confidentiality and authenticity of the messages [7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%