LoRaWAN security

5Citations
Citations of this article
54Readers
Mendeley users who have this article in their library.

Abstract

The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties supported in LoRaWAN security are mutual end-point authentication, data origin authentication, integrity and replay protection, and confidentiality. The use of symmetric cryptography and prior secret key sharing between a device and a server enables an extremely power efficient and network efficient activation procedure.

Cite

CITATION STYLE

APA

Seller, O. (2021). LoRaWAN security. Journal of ICT Standardization, 9(1), 47–60. https://doi.org/10.13052/jicts2245-800X.915

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free