The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties supported in LoRaWAN security are mutual end-point authentication, data origin authentication, integrity and replay protection, and confidentiality. The use of symmetric cryptography and prior secret key sharing between a device and a server enables an extremely power efficient and network efficient activation procedure.
CITATION STYLE
Seller, O. (2021). LoRaWAN security. Journal of ICT Standardization, 9(1), 47–60. https://doi.org/10.13052/jicts2245-800X.915
Mendeley helps you to discover research relevant for your work.