Results 11 to 20 of about 13,803 (208)

Understanding the limits of LoRaWAN [PDF]

open access: yesIEEE Communications Magazine, 2017
The quick proliferation of LPWAN networks, being LoRaWAN one of the most adopted, raised the interest of the industry, network operators and facilitated the development of novel services based on large scale and simple network structures.
Adelantado, Ferran   +5 more
core   +7 more sources

LoRaWAN: Lost for Localization?

open access: yesIEEE Sensors Journal, 2022
Nowadays, the flexible localization solution for various devices for work safety is one of the most demanding research questions. Notably, it is expected to provide an acceptable level of precision in different types of environments empowered by wearable technology and the Interent of Things (IoT) devices. Existing leading localization technologies are
Ekaterina Svertoka   +5 more
openaire   +4 more sources

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

Improving Energy Efficiency in LoRaWAN Networks with Multiple Gateways

open access: yesSensors, 2023
LoRaWAN has imposed itself as a promising and suitable technology for massive machine-type communications. With the acceleration of deployment, improving the energy efficiency of LoRaWAN networks has become paramount, especially with the limitations of ...
Ali Loubany   +3 more
doaj   +1 more source

A Complete Key Management Scheme for LoRaWAN v1.1

open access: yesSensors, 2021
Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications.
Xingda Chen, Margaret Lech, Liuping Wang
doaj   +1 more source

Communication protocols evaluation for a wireless rainfall monitoring network in an urban area

open access: yesHeliyon, 2021
Rainfall monitoring networks are key elements for the development of alerts and prediction models for communities at risk of flooding during high intensity rainfall events.
Lilia Ortega-Gonzalez   +3 more
doaj   +1 more source

Survey on wireless technology trade-offs for the industrial internet of things [PDF]

open access: yes, 2020
Aside from vast deployment cost reduction, Industrial Wireless Sensor and Actuator Networks (IWSAN) introduce a new level of industrial connectivity.
De Poorter, Eli   +3 more
core   +1 more source

Collision Avoidance Resource Allocation for LoRaWAN [PDF]

open access: yesSensors, 2021
The number of connected IoT devices is significantly increasing and it is expected to reach more than two dozens of billions of IoT connections in the coming years. Low Power Wide Area Networks (LPWAN) have become very relevant for this new paradigm due to features such as large coverage and low power consumption. One of the most appealing technologies
Natalia Chinchilla-Romero   +3 more
openaire   +4 more sources

LoRaWAN AS PART OF A SMART CITY STRATEGY

open access: yesInternational Journal of Innovative Technologies in Economy, 2022
The LoRaWAN technology is repeatedly mentioned in connection with smart city initiatives, as it moves in the field of connectivity and IoT environment. This paper examines the role of LoRaWAN in smart city strategy and what vulnerabilities are known in ...
Aik Wirsbinna
doaj   +1 more source

LoRaWAN Security

open access: yesJournal of ICT Standardization, 2021
The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties supported in LoRaWAN security are mutual end-point authentication, data origin authentication, integrity and replay protection, and confidentiality.
openaire   +2 more sources

Home - About - Disclaimer - Privacy