A Systematic Review of Security in the LoRaWAN Network Protocol
Authors:
Poliana de Moraes,
Arlindo Flavio da Conceição
Abstract:
The age of the Internet of Things is adding an increasing number of new devices to the Internet and is expected to have fifty billion connected units by 2021. These form an extensive network that may have multiple points where there is a risk of attacks that can compromise the entire system. This paper has conducted a systematic review of security in LoRaWAN protocol specification versions 1.0 and…
▽ More
The age of the Internet of Things is adding an increasing number of new devices to the Internet and is expected to have fifty billion connected units by 2021. These form an extensive network that may have multiple points where there is a risk of attacks that can compromise the entire system. This paper has conducted a systematic review of security in LoRaWAN protocol specification versions 1.0 and 1.1 by locating its vulnerabilities and determining what measures can be taken for improvement and how they can be checked or tested. The review identifies nineteen areas of vulnerability in the LoRaWAN protocol and shows that the current studies focus on specification version 1.0, key management, and authentication procedures.
△ Less
Submitted 1 May, 2021;
originally announced May 2021.
Review of LoRaWAN Applications
Authors:
Lucas R. de Oliveira,
Poliana de Moraes,
Lauro P. S. Neto,
Arlindo F. da Conceição
Abstract:
This paper presents a systematic review of LoRaWAN applications. We analyzed 71 cases of application, with a focus on deploy and challenges faced. The review summarizes the characteristics of the network protocol and shows applications in the context of smart cities, smart grids, smart farms, health, location, industry, and military. Finally, this article analyzes some security issues.
This paper presents a systematic review of LoRaWAN applications. We analyzed 71 cases of application, with a focus on deploy and challenges faced. The review summarizes the characteristics of the network protocol and shows applications in the context of smart cities, smart grids, smart farms, health, location, industry, and military. Finally, this article analyzes some security issues.
△ Less
Submitted 13 April, 2020;
originally announced April 2020.