The realm of Low Power Wide Area Network (LPWAN) has a paramount influence on the way we work and live. For instance, real-time applications and rapid packet transiting for long-range have now come into practice that was previously considered mysterious. However, euphoria becomes a problem when it comes to security considerations, as low-power devices possess limited processing units that are unable to elucidate robust security algorithms. In this case, the Low Power Wide Area Network (LoRaWAN) stepped into a technological competition that filled the gap by adopting the end-to-end security feature. Though, LoRaWAN protocol entails fundamental security requirements but the implementation matters. This paper presents security analyses in the LoRaWAN networks. In addition, we provide a bibliometric overview of security considerations in LoRaWAN that helps researchers for thorough insights and implementation
Review of Security Vulnerabilities in LoRaWAN
Qadir J.;Gastaldo P.;Caviglia D. D.
2023-01-01
Abstract
The realm of Low Power Wide Area Network (LPWAN) has a paramount influence on the way we work and live. For instance, real-time applications and rapid packet transiting for long-range have now come into practice that was previously considered mysterious. However, euphoria becomes a problem when it comes to security considerations, as low-power devices possess limited processing units that are unable to elucidate robust security algorithms. In this case, the Low Power Wide Area Network (LoRaWAN) stepped into a technological competition that filled the gap by adopting the end-to-end security feature. Though, LoRaWAN protocol entails fundamental security requirements but the implementation matters. This paper presents security analyses in the LoRaWAN networks. In addition, we provide a bibliometric overview of security considerations in LoRaWAN that helps researchers for thorough insights and implementationI documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.