A Security-Conscious Primer on LoRa and LoRaWAN Technologies

Guardado en:
Detalles Bibliográficos
Publicado en:European Conference on Cyber Warfare and Security (Jun 2025), p. 638-647
Autor principal: Simões, Tomás
Otros Autores: Cruz, Tiago, Sousa, Bruno, Simões, Paulo
Publicado:
Academic Conferences International Limited
Materias:
Acceso en línea:Citation/Abstract
Full Text
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 3244089508
003 UK-CbPIL
035 |a 3244089508 
045 2 |b d20250601  |b d20250630 
084 |a 142231  |2 nlm 
100 1 |a Simões, Tomás 
245 1 |a A Security-Conscious Primer on LoRa and LoRaWAN Technologies 
260 |b Academic Conferences International Limited  |c Jun 2025 
513 |a Conference Proceedings 
520 3 |a At its core, the Internet of Things (IoT) paradigm encompasses a wealth of devices, mainly sensors, actuators and systems that can connect and exchange data through any means of communication, as long as they're individually addressable and are a part of a network. There is a wide array of possible network types, among which Low-Power Short-Range Networks (LPSRNs) and Low-Power Wide-Area Networks (LPWANs) offer a great deal of potential to support energy efficient communications with low maintenance. LoRa (an abbreviation of "Long Range"), one of the most popular technologies for implementing LPWANs, is a radio-based technique derived from Chirp Spread Spectrum (CSS) technology (where "Chirp" stands for Compressed High Intensity Radar Pulse). However, when used as a standalone technology, it exposes exchanged data as LoRa devices simply transmit packets publicly without any built-in security. The LoRaWAN (LoRa Wide Area Network) framework addresses these shortcomings by providing a software layer on top of LoRa, supporting device addressing, management and message acknowledgement, while also providing a security framework with network and application encryption layers based on the AES-128 algorithm. LoRaWAN security mechanisms provide authentication and integrity protection of transmitted packets to the LoRaWAN Network Server (LNS), to ensure end-to-end encryption at the application layer. Due to its widespread application in loT scenarios such as smart cities, smart transportation and environmental monitoring, the security of the LoraWAN framework is fundamental to ensure the security and safety of critical metering and telemetry infrastructures. In this paper we provide a primer on LoRa and LoRaWAN technologies and address the security and management-related aspects of this framework, also presenting a threat model for LoRaWAN networks based on the STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege) methodology, providing a convenient starting point for risk assessment and preventive/mitigation action planning. 
610 4 |a Semtech Corp 
653 |a Smart cities 
653 |a Encryption 
653 |a Software 
653 |a Network servers 
653 |a Wide area networks 
653 |a Internet of Things 
653 |a Spread spectrum 
653 |a Telemetry 
653 |a Data exchange 
653 |a Spoofing 
653 |a Communication 
653 |a Environmental monitoring 
653 |a Power management 
653 |a Packet transmission 
653 |a Automation 
653 |a Actuators 
653 |a Cybersecurity 
653 |a Chirp 
653 |a Risk assessment 
653 |a Energy efficiency 
653 |a Application 
653 |a Action planning 
653 |a Wealth 
653 |a Internet 
653 |a Technology 
653 |a Security 
653 |a Mitigation 
653 |a Data encryption 
653 |a Networks 
653 |a Radio 
653 |a Social networks 
653 |a Morality 
653 |a Power 
653 |a Frame analysis 
653 |a Cryptography 
700 1 |a Cruz, Tiago 
700 1 |a Sousa, Bruno 
700 1 |a Simões, Paulo 
773 0 |t European Conference on Cyber Warfare and Security  |g (Jun 2025), p. 638-647 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3244089508/abstract/embedded/75I98GEZK8WCJMPQ?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3244089508/fulltext/embedded/75I98GEZK8WCJMPQ?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3244089508/fulltextPDF/embedded/75I98GEZK8WCJMPQ?source=fedsrch