LoRaWAN security survey: Issues, threats and possible mitigation techniques

Loading...
Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Elsevier B.V.

Abstract

With the emergence of IoT, new communication technologies have been proposed to cope with the IoT large scale, and the ”things” constraints in terms of power and processing resources. One of these technologies is LoRaWAN, which aims at providing very-long-range transmission with low power consumption. However, this technology suffers from several security and privacy vulnerabilities that could compromise availability, authentication, and privacy. In fact, security and privacy are major concerns in any IoT network. Consequently, effective countermeasures are highly needed to enable LoRaWAN's wide adoption in the IoT domain. In this paper, we review the LoRaWAN architecture, applications, and security concerns. In addition, we list several possible countermeasures to address the existing LoRaWAN vulnerabilities and thus, to prevent the related attacks. © 2020 Elsevier B.V.

Description

Keywords

Lorawan applications, Lorawan security, Lorawan security attacks

Citation

Endorsement

Review

Supplemented By

Referenced By