Proceedings of the IV International research conference "Information technologies in Science, Management, Social sphere and Medicine" (ITSMSSM 2017)

Analysis of vulnerabilities in low-power wide-area networks by example of the LoRaWAN

Authors
Sergey Iskhakov, Roman Meshcheryakov, Anastasia Iskhakova, Sergey Bondarchuk
Corresponding Author
Sergey Iskhakov
Available Online December 2017.
DOI
https://doi.org/10.2991/itsmssm-17.2017.69How to use a DOI?
Keywords
Internet of Things, modulation, network, vulnerability, replay attack, spoofing.
Abstract
The increasing number of automated systems using the global network for management has led to the need to search for new technologies for transmitting data from various sensors over long distances with minimal energy consumption. Today, there are several similar technologies on the market that claim to be the world standard in the concept of the Internet of things, but none of them has yet been studied in detail from the point of view of security. This article is devoted to the analysis of one of the most common protocols in order to identify potential vulnerabilities.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Cite this article

TY  - CONF
AU  - Sergey Iskhakov
AU  - Roman Meshcheryakov
AU  - Anastasia Iskhakova
AU  - Sergey Bondarchuk
PY  - 2017/12
DA  - 2017/12
TI  - Analysis of vulnerabilities in low-power wide-area networks by example of the LoRaWAN
BT  - IV International research conference "Information technologies in Science, Management, Social sphere and Medicine" (ITSMSSM 2017)
PB  - Atlantis Press
SN  - 2352-538X
UR  - https://doi.org/10.2991/itsmssm-17.2017.69
DO  - https://doi.org/10.2991/itsmssm-17.2017.69
ID  - Iskhakov2017/12
ER  -