Analysis on functionalities and security features of Internet of Things related protocols

A Rizzardi, S Sicari, A Coen-Porisini - Wireless Networks, 2022 - Springer
Abstract The Internet of Things (IoT) paradigm is characterized by the adoption of different
protocols and standards to enable communications among heterogeneous and, often …

LoRaWAN security issues and mitigation options by the example of agricultural IoT scenarios

F Kuntke, V Romanenko, S Linsner… - Transactions on …, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) is a major trend that is seen as a great opportunity to
improve efficiency in many domains, including agriculture. This technology could transform …

A systematic review of security in the lorawan network protocol

P de Moraes, AF da Conceição - ar** attack detection in low power wide area networks using a deep learning approach
F Alizadeh, AJ Bidgoly - Peer-to-Peer Networking and Applications, 2023 - Springer
Abstract Low Power Wide Area Networks (LPWANs) are a class of wireless technologies
with characteristics such as large coverage areas, low bandwidth, very small payload size …

Ids and ips in lpwan (lorawan, sigfox, and nb-iot)

A Amouri, VT Alaparthy, I Butun - Low-Power Wide-Area Networks …, 2023 - Springer
Abstract Information security is of vital importance in any industry. Due to the emergence of
smart devices, the need has only soared. Especially in wireless devices with low …

Improvement of routing protocol for IoT network using SDN/OpenFlow

FM Shuker - 2019 1st AL-Noor International Conference for …, 2019 - ieeexplore.ieee.org
Generally, Internet of things (IoT) has been coming to the markets at all times, including
small sensors that work on the ability of a very small battery. One of the most important …

Security enhancement of joint procedure based on improved elliptic curve cryptography in LoRaWAN

R Sujatha, V Radovic - Wireless Personal Communications, 2023 - Springer
For long-range communication, Long-Range Wide Area Network (LoRaWAN) is the
appropriate media access layer protocol. This LoRaWAN protocol connects the end devices …

Protecting LoRaWan data against untrusted network servers

P De Moraes, AF Da Conceição - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
LoRaWAN is a wireless network technology applied in the Internet of Things long-range
communication. Even though LoRaWAN is an end-to-end data encryption protocol by …

Encryption Edge Points in Face using Light Stream Algorithm

AM Abd Al-Munaf, AS Jamil… - 2022 3rd Information …, 2022 - ieeexplore.ieee.org
Unauthorized sharing and data theft represent a huge challenge for everyone, especially for
companies and sensitive governmental institutions, where the videos might be hacked or …