Security Vulnerabilities in LoRaWAN
暂无分享,去创建一个
Fernando A. Kuipers | Christian Doerr | Xueying Yang | Evgenios Karampatzakis | F. Kuipers | C. Doerr | Xueying Yang | E. Karampatzakis
[1] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[2] Wouter Joosen,et al. Selective Jamming of LoRaWAN using Commodity Hardware , 2017, MobiQuitous.
[3] Ki-Hyung Kim,et al. Risk analysis and countermeasure for bit-flipping attack in LoRaWAN , 2017, 2017 International Conference on Information Networking (ICOIN).
[4] Paul Thomas,et al. Low Throughput Networks for the IoT: Lessons learned from industrial implementations , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[5] Bipjeet Kaur,et al. Comparative study of Internet of Things infrastructure and security , 2016 .
[6] Leila Azouz Saidane,et al. Enhancing the security of the IoT LoraWAN architecture , 2016, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).
[7] Jordy Michorius,et al. What ’ s Mine is Not Yours : LoRa Network and Privacy of Data on Publishing Devices , 2016 .
[8] Fernando A. Kuipers,et al. LoRaWAN in the Wild: Measurements from The Things Network , 2017, ArXiv.
[9] Ki-Hyung Kim,et al. Scenario and countermeasure for replay attack using join request messages in LoRaWAN , 2017, 2017 International Conference on Information Networking (ICOIN).
[10] Simone Zulian,et al. Security threat analysis and countermeasures for LoRaWAN join procedure , 2016 .