Analysis of LoRaWAN security echanism
LoRaWAN is one of the most important low power WAN technologies.As LoRaWAN technology is massively applied in various vertical industries,network security becomes more and more important.The security mechanism of LoRaWAN technology was analyzed.In addition,the comparative analysis of similar schemes...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2019-08-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2019190/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850111368767733760 |
|---|---|
| author | Xiaobo YU Hongru ZHU Dapeng LIU Qing AN |
| author_facet | Xiaobo YU Hongru ZHU Dapeng LIU Qing AN |
| author_sort | Xiaobo YU |
| collection | DOAJ |
| description | LoRaWAN is one of the most important low power WAN technologies.As LoRaWAN technology is massively applied in various vertical industries,network security becomes more and more important.The security mechanism of LoRaWAN technology was analyzed.In addition,the comparative analysis of similar schemes was carried out.The future research direction of LoRaWAN security mechanism was also pointed out. |
| format | Article |
| id | doaj-art-9e24bd3f894e405b8c9956fbf12fd80f |
| institution | OA Journals |
| issn | 1000-0801 |
| language | zho |
| publishDate | 2019-08-01 |
| publisher | Beijing Xintong Media Co., Ltd |
| record_format | Article |
| series | Dianxin kexue |
| spelling | doaj-art-9e24bd3f894e405b8c9956fbf12fd80f2025-08-20T02:37:38ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012019-08-013515215759588594Analysis of LoRaWAN security echanismXiaobo YUHongru ZHUDapeng LIUQing ANLoRaWAN is one of the most important low power WAN technologies.As LoRaWAN technology is massively applied in various vertical industries,network security becomes more and more important.The security mechanism of LoRaWAN technology was analyzed.In addition,the comparative analysis of similar schemes was carried out.The future research direction of LoRaWAN security mechanism was also pointed out.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2019190/LoRaWANlow powersecurity |
| spellingShingle | Xiaobo YU Hongru ZHU Dapeng LIU Qing AN Analysis of LoRaWAN security echanism Dianxin kexue LoRaWAN low power security |
| title | Analysis of LoRaWAN security echanism |
| title_full | Analysis of LoRaWAN security echanism |
| title_fullStr | Analysis of LoRaWAN security echanism |
| title_full_unstemmed | Analysis of LoRaWAN security echanism |
| title_short | Analysis of LoRaWAN security echanism |
| title_sort | analysis of lorawan security echanism |
| topic | LoRaWAN low power security |
| url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2019190/ |
| work_keys_str_mv | AT xiaoboyu analysisoflorawansecurityechanism AT hongruzhu analysisoflorawansecurityechanism AT dapengliu analysisoflorawansecurityechanism AT qingan analysisoflorawansecurityechanism |