TBU Publications
Repository of TBU Publications

LoRaWAN network security using simulated scenarios

DSpace Repository

Show simple item record

dc.title LoRaWAN network security using simulated scenarios en
dc.contributor.author Blahová, Marta
dc.contributor.author Hromada, Martin
dc.relation.ispartof International Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management, SGEM
dc.identifier.issn 1314-2704 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 978-619-7603-22-4
dc.date.issued 2021
utb.relation.volume 21
utb.relation.issue 2.1
dc.citation.spage 35
dc.citation.epage 43
dc.event.title 21st International Multidisciplinary Scientific Geoconference: Informatics, Geoinformatics and Remote Sensing, SGEM 2021
dc.event.location Varna
utb.event.state-en Bulgaria
utb.event.state-cs Bulharsko
dc.event.sdate 2021-08-16
dc.event.edate 2021-08-22
dc.type conferenceObject
dc.language.iso en
dc.publisher International Multidisciplinary Scientific Geoconference
dc.identifier.doi 10.5593/sgem2021/2.1/s07.13
dc.relation.uri https://epslibrary.at/sgem_jresearch_publication_view.php?page=view&editid1=7866
dc.subject cybersecurity en
dc.subject LoRa en
dc.subject LoRaWAN en
dc.subject security en
dc.subject software defined radio en
dc.subject wireless communication en
dc.description.abstract The article describes the LoRaWAN network. LoRaWAN is a communication protocol that provides long-distance communication with low power consumption. Long Range Wide Area Networks (LoRaWAN) is open-center access (MAC) layer technology designed for long-distance connections with a large number of low-energy devices. LoRaWAN devices in various network settings use the most modern network simulator (NS-3). First, one device and its mobility are introduced. Due to its properties, the protocol is very popular in the field of the Internet of Things. In this context, the security of this protocol is of great importance given the current ubiquity of the Internet. The article deals with eavesdropping and eavesdropping combined with decryption of LoRaWAN communication on the physical layer and on the Media Access Control sublayer of the line layer. The article focuses on the security gap within the backward compatibility of the LoRaWAN protocol. It currently uses the LoRaWAN protocol in version 1.1.x, which addresses the main security gap from the previous 1.0.x protocol. The article uses a software-defined radio to listen to the news. The article verify backward compatibility by replaying the message and sending the fake message to the server. © 2021 International Multidisciplinary Scientific Geoconference. All rights reserved. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1011007
utb.identifier.obdid 43882899
utb.identifier.scopus 2-s2.0-85131693152
utb.source d-scopus
dc.date.accessioned 2022-06-20T13:11:01Z
dc.date.available 2022-06-20T13:11:01Z
dc.description.sponsorship Univerzita Tomáše Bati ve Zlíně: IGA/FAI/2021/002
utb.contributor.internalauthor Blahová, Marta
utb.contributor.internalauthor Hromada, Martin
utb.fulltext.sponsorship This research was based on the support of the Internal Grant Agency of Tomas Bata University in Zlín, the IGA/FAI/2021/002 project and the Department of Security Engineering, Faculty of Applied Informatics.
utb.scopus.affiliation Tomas Bata University in Zlín, Faculty of Applied Informatics, Czech Republic
utb.fulltext.projects IGA/FAI/2021/002
Find Full text

Files in this item

Show simple item record