Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








63 Hits in 4.0 sec

Using blockchain to build trusted LoRaWAN sharing server

Jun Lin, Zhiqi Shen, Chunyan Miao, Siyuan Liu
2017 International Journal of Crowd Science  
This study aims to propose a conceptual architecture design of a blockchain built-in solution for LoRaWAN network servers to solve these two issues for LoRaWAN IoT solution.  ...  Compared with NB-IoT networks, which are mainly built and managed by mobile network operators, LoRa wide area networks (LoRaWAN) are mainly operated by private companies or organizations, which suggests  ...  Blockchain is an emerging technology for decentralized and transactional data sharing across a network of untrusted participants.  ... 
doi:10.1108/ijcs-08-2017-0010 fatcat:572v3bjz7bdylgdszvyils3z7i

Impersonating LoRaWAN gateways using Semtech Packet Forwarder [article]

Lukas Simon Laufenberg
2019 arXiv   pre-print
We explain our attack and propose countermeasures to increase the security of LoRaWAN networks.  ...  Low Power Wide Area Network (LPWAN) technologies like the Long Range Wide Area Network (LoRaWAN) standard provide the foundation of applications realizing communication and intelligent interaction between  ...  LoRaWAN's network topology follows a star of stars pattern, as Figure 1 . The network server, as a central point, is the hub, all LoRaWAN data is exchanged over.  ... 
arXiv:1904.10728v1 fatcat:qfh2stxigndhtcf5kzrdjffc2a

A Survey on the Security of Low Power Wide Area Networks: Threats, Challenges, and Potential Solutions

Kuburat Oyeranti Adefemi Alimi, Khmaies Ouahada, Adnan M. Abu-Mahfouz, Suvendi Rimer
2020 Sensors  
Low power wide area network (LPWAN) is among the fastest growing networks in Internet of Things (IoT) technologies.  ...  However, this promising network are exposed to various security and privacy threats and challenges.  ...  Untrusted Gateways Gateways are transparent bridges between end nodes and network server. They create communication between end nodes and the server.  ... 
doi:10.3390/s20205800 pmid:33066336 fatcat:3erm52257jgq3jlmsvk2sikqge

Hardware Security in Advanced Manufacturing

Mohammad Monjur, Joshua Calzadillas, Mashrafi Kajol, Qiaoyan Yu
2022 Proceedings of the Great Lakes Symposium on VLSI 2022  
Existing literature that addresses the attacks in advanced manufacturing is mainly at the network level.  ...  More specifically, our analysis focuses on the security vulnerability of sensors, local data processing nodes, and the interface implementation for standardized communication protocols.  ...  Hackers gained access to that company's servers and retrieved the archived customers data [9] .  ... 
doi:10.1145/3526241.3530829 fatcat:5w6mbanhbjdabnk7cmklddfwri

LoRaWAN Security: An Evolvable Survey on Vulnerabilities, Attacks and their Systematic Mitigation

Frank Hessel, Lars Almon, Matthias Hollick
2022 ACM transactions on sensor networks  
With this, we provide a tool to hardware manufacturers, software developers and providers, and network operators to achieve sustainable security for IoT deployments.  ...  LoRaWAN IoT deployments are expected to operate for multiple years or even decades.  ...  We provide manufacturers, developers, and network operators with a powerful methodology to achieve sustainable security for IoT deployments.  ... 
doi:10.1145/3561973 fatcat:zpuopghu7zge3c5cgqtxcsgrd4

Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks [chapter]

Ioannis Chatzigiannakis, Vasiliki Liagkou, Paul G. Spirakis
2018 Lecture Notes in Computer Science  
Recent technologies for low-rate, long-range transmission in unlicensed sub-GHz frequency bands enables the realization of Long-range Wide Area Network.  ...  Furthermore, the critical data like symmetric keys, private-public keys and IoT device credentials are protected using a HMAC before they are stored into the Network server and Application server to further  ...  If an adversary could posses the session key, then he can generate a LoRaWAN message that will pass the signature checking procedure at the network server.  ... 
doi:10.1007/978-3-319-94147-9_8 fatcat:kolaw2yehzchnjv3dvy3ykhii4

Integrating LPWAN technologies in the 5G ecosystem: A survey on security challenges and solutions

Jesus Sanchez-Gomez, Dan Garcia-Carrillo, Ramon Sanchez-Iborra, Jose L. Hernandez-Ramos, Jorge Granjal, Rafael Marin-Perez, Miguel A. Zamora-Izquierdo
2020 IEEE Access  
The goal is to protect both UE and N3IWF from possibles attacks over the untrusted non-3GPP access network.  ...  It means that the network server could have access to the application data sent by the device.  ... 
doi:10.1109/access.2020.3041057 fatcat:tosmrfrsm5dfne2pcswejhojni

A Survey on Secure Communication Protocols for IoT Systems

Khaja Moinuddin, Nalavadi Srikantha, Lokesh K S, Aswatha Narayana
2017 International Journal Of Engineering And Computer Science  
It is important to protect IoT systems against malicious attacks, especially to prevent attackers from obtaining control over the devices.  ...  In this paper, we investigate the security capabilities of existing protocols and networking stacks for IoT.  ...  LoRaWAN networks have a star-of-stars topology, in which end-devices send messages to gateways, which relay these messages to a central server [24] .  ... 
doi:10.18535/ijecs/v6i6.41 fatcat:r4dawcibwfha5h7s3u2nlqmqhu

GNSS-Free Outdoor Localization Techniques for Resource-Constrained IoT Architectures: A Literature Review

Azin Moradbeikie, Ahmad Keshavarz, Habib Rostami, Sara Paiva, Sérgio Ivan Lopes
2021 Applied Sciences  
To increase IoT applicability, data generated by the IoT devices need to be time-stamped and spatially contextualized.  ...  After Joining the LoRaWAN network, end nodes can exchange data with the LoRaWAN network server throw LoRaWAN gateways.  ...  For communication and data transmission, end nodes must join to network and their connection is allowed by the LoRaWAN network server.  ... 
doi:10.3390/app112210793 fatcat:llkdeki5pfc5xh4ztlrw5n5amy

A softwarized perspective of the 5G networks [article]

Kleber Vieira Cardoso, Cristiano Bonato Both, Lúcio Rene Prade, Ciro J. A. Macedo, Victor Hugo L. Lopes
2020 arXiv   pre-print
The article provides a brief overview of mobile cellular networks, including basic concepts, operations, and evolution through the called 'generations' of mobile networks.  ...  From a software perspective, RAN is presented in the context of 4G and 5G networks, which includes the virtualization and disaggregation concepts.  ...  5G network until reaching the LoRaWAN server.  ... 
arXiv:2006.10409v3 fatcat:brbcoahun5gvfkepavmbro4co4

Edge-Computing-Driven Internet of Things: A Survey

Linghe Kong, Jinlin Tan, Junqin Huang, Guihai Chen, Shuaitian Wang, Xi Jin, Peng Zeng, Muhammad K. Khan, Sajal K. Das
2022 ACM Computing Surveys  
The main idea of edge computing is placing data processing in near-edge devices instead of remote cloud servers. It is promising to build more scalable, low-latency IoT systems.  ...  In the cloud-based architecture, a large amount of IoT data is transferred to the cloud for data management, analysis, and decision making.  ...  In [151] , to protect against false data injection attacks, they proposed to ilter out the inserted data.  ... 
doi:10.1145/3555308 fatcat:r6smitdbybe3rpacpyz4wtoqve

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
Such reliance on IoT is resulting in a significant amount of data to be generated, collected, processed and analyzed. The big data analytics is no doubt beneficial for business development.  ...  However, at the same time, numerous threats to the availability and privacy of the user data, message and device integrity, the vulnerability of IoT devices to malware attacks and the risk of physical  ...  It also provides secure key update over an untrusted network [156] . Network Segmentation.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4

Communication and Security Trade-Offs for Battery-Powered Devices: A Case Study on Wearable Medical Sensor Systems

Jori Winderickx, Pierre Bellier, Patrick Duflot, Nele Mentens
2021 IEEE Access  
As a consequence, sensor data measured on hospitalized patients should be protected against potential adversaries that retrieve or manipulate the data.  ...  LoRaWAN and Sigfox can transmit data over very long ranges of a few kilometers.  ... 
doi:10.1109/access.2021.3075980 fatcat:uz7ot3hakzb4rguf353m3xiwz4

LoRaChainCare: An IoT Architecture Integrating Blockchain and LoRa Network for Personal Health Care Data Monitoring

Bouthaina Dammak, Mariem Turki, Saoussen Cheikhrouhou, Mouna Baklouti, Rawya Mars, Afef Dhahbi
2022 Sensors  
protecting patients' privacy.  ...  LoRa (Long Range) communications technology is emerging as the leader among Low-Power Wide-Area Networks (LPWANs) entering the IoT domain benefiting from many features such as long-range distances and  ...  Indeed, the distributed topology of Edge/Fog computing increases the need for securing the network against the attacks.  ... 
doi:10.3390/s22041497 pmid:35214404 pmcid:PMC8875370 fatcat:quic5lrggrhyvdgb2wu2cum35y

Malicious IoT Implants: Tampering with Serial Communication over the Internet [chapter]

Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson
2018 Lecture Notes in Computer Science  
The expansion of the Internet of Things (IoT) promotes the roll-out of low-power wide-area networks (LPWANs) around the globe.  ...  These technologies supply regions and cities with Internet access over the air, similarly to mobile telephony networks, but they are specifically designed for low-power applications and tiny computing  ...  From a network perspective, LoRaWAN utilizes a star-to-star architecture, in which so-called gateways relay messages either between IoT nodes or from an IoT node to the central network server and vice  ... 
doi:10.1007/978-3-030-00470-5_25 fatcat:m77bdvr43naargkf7qwlqi54pi
« Previous Showing results 1 — 15 out of 63 results