2022
DOI: 10.1002/ett.4452
|View full text |Cite
|
Sign up to set email alerts
|

 LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios

Abstract: The Internet of Things (IoT) is a major trend that is seen as a great opportunity to improve efficiency in many domains, including agriculture. This technology could transform the sector, improving the management and quality of agricultural operations, for example, crop farming. The most promising data transmission standard for this domain seems to be Long Range Wide Area Network (LoRaWAN), a popular representative of low power wide area network technologies today. LoRaWAN, like any wireless protocol, has prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 69 publications
0
7
0
Order By: Relevance
“…When it comes to the context of the Internet of Things, this layer is the most crucial, since it unifies the numerous forms of communication technology that make it possible for IoT devices to communicate with one another. Among the most popular of these communication methods are ZigBee [7], BLE (i.e., piconet) [8,9], 6LoWPAB [10][11][12], LoRaWAN [13][14][15], and readable tags.…”
Section: Network Layermentioning
confidence: 99%
“…When it comes to the context of the Internet of Things, this layer is the most crucial, since it unifies the numerous forms of communication technology that make it possible for IoT devices to communicate with one another. Among the most popular of these communication methods are ZigBee [7], BLE (i.e., piconet) [8,9], 6LoWPAB [10][11][12], LoRaWAN [13][14][15], and readable tags.…”
Section: Network Layermentioning
confidence: 99%
“…Purely logical disruptions, like prefix hijacking, can also lead to major constraints with regard to the accessibility of a web service (Ballani et al 2007 ). Even on the level of farms, network technology like wireless sensor networks could be attacked (Kuntke et al 2022 ).…”
Section: State Of Researchmentioning
confidence: 99%
“…The architectural design of LoRaWAN nodes is structured into three distinct classes: A, B, and C [130]. Class A nodes exhibit minimal power consumption, efficiently transmitting a limited number of data packets to the gateway and spending most of their time idle [131]. In contrast, Class B nodes, in addition to the reception windows resembling Class A, open specific reception windows during scheduled time slots [130].…”
Section: ) Lorawanmentioning
confidence: 99%