Analysis of vulnerabilities in low-power wide-area networks by example of the LoRaWAN
Sergey Iskhakov, Roman Meshcheryakov, Anastasia Iskhakova, Sergey Bondarchuk
Available Online December 2017.
- https://doi.org/10.2991/itsmssm-17.2017.69How to use a DOI?
- Internet of Things, modulation, network, vulnerability, replay attack, spoofing.
- The increasing number of automated systems using the global network for management has led to the need to search for new technologies for transmitting data from various sensors over long distances with minimal energy consumption. Today, there are several similar technologies on the market that claim to be the world standard in the concept of the Internet of things, but none of them has yet been studied in detail from the point of view of security. This article is devoted to the analysis of one of the most common protocols in order to identify potential vulnerabilities.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Sergey Iskhakov AU - Roman Meshcheryakov AU - Anastasia Iskhakova AU - Sergey Bondarchuk PY - 2017/12 DA - 2017/12 TI - Analysis of vulnerabilities in low-power wide-area networks by example of the LoRaWAN BT - Proceedings of the IV International research conference "Information technologies in Science, Management, Social sphere and Medicine" (ITSMSSM 2017) PB - Atlantis Press SP - 334 EP - 338 SN - 2352-538X UR - https://doi.org/10.2991/itsmssm-17.2017.69 DO - https://doi.org/10.2991/itsmssm-17.2017.69 ID - Iskhakov2017/12 ER -