Detail publikace

Book on LPWAN Technologies for IoT and M2M Applications: Security in Low Power Wide Area Networks: State-of-the-Art and Development towards the 5G

Originální název

Book on LPWAN Technologies for IoT and M2M Applications: Security in Low Power Wide Area Networks: State-of-the-Art and Development towards the 5G

Anglický název

Book on LPWAN Technologies for IoT and M2M Applications: Security in Low Power Wide Area Networks: State-of-the-Art and Development towards the 5G

Jazyk

en

Originální abstrakt

The chapter delivers the detailed discussion of the potential security threats, features, and mechanisms for the low power wide area (LPWA) networks in general, and the three dominant LPWA technologies - LoRaWAN, cellular Internet of Things (IoT) (e.g., Cat-NB1) and Sigfox, which currently dominate the market, in particular. We start by identifying the key actors, their interrelations and interfaces in the context of a generalized LPWA network architecture, and then determine the potential security threats and attack vectors. Next, we specify sixteen major security features and discuss how each of the three technologies approaches each feature. This manner of presentation enables not only to develop an in-depth understanding of the security mechanism underlying particular LPWA technology but also facilitates comparison of the approaches taken by the technology developers and implementers. Finally, we also take a look in the future – towards the time when LPWA technology might get integrated with the 5G. Specifically, we focus on the the security aspects related to the use of LPWA and IoT as a part of the 5G, identify the gaps and discuss some of the further steps to be taken.

Anglický abstrakt

The chapter delivers the detailed discussion of the potential security threats, features, and mechanisms for the low power wide area (LPWA) networks in general, and the three dominant LPWA technologies - LoRaWAN, cellular Internet of Things (IoT) (e.g., Cat-NB1) and Sigfox, which currently dominate the market, in particular. We start by identifying the key actors, their interrelations and interfaces in the context of a generalized LPWA network architecture, and then determine the potential security threats and attack vectors. Next, we specify sixteen major security features and discuss how each of the three technologies approaches each feature. This manner of presentation enables not only to develop an in-depth understanding of the security mechanism underlying particular LPWA technology but also facilitates comparison of the approaches taken by the technology developers and implementers. Finally, we also take a look in the future – towards the time when LPWA technology might get integrated with the 5G. Specifically, we focus on the the security aspects related to the use of LPWA and IoT as a part of the 5G, identify the gaps and discuss some of the further steps to be taken.

BibTex


@inbook{BUT159846,
  author="Radek {Fujdiak} and Konstantin {Mikhaylov} and Martin {Štůsek} and Pavel {Mašek} and Ijaz {Ahmed} and Lukáš {Malina} and Pawani {Parambage} and Miroslav {Vozňák} and Petr {Mlýnek} and Ari {Pouttu}",
  title="Book on LPWAN Technologies for IoT and M2M Applications: Security in Low Power Wide Area Networks: State-of-the-Art and Development towards the 5G",
  annote="The chapter delivers the detailed discussion of the potential security threats, features, and mechanisms for the low power wide area (LPWA) networks in general, and the three dominant LPWA technologies - LoRaWAN, cellular Internet of Things (IoT) (e.g., Cat-NB1) and Sigfox, which currently dominate the market, in particular. We start by identifying the key actors, their interrelations and interfaces in the context of a generalized LPWA network architecture, and then determine the potential security threats and attack vectors. Next, we specify sixteen major security features and discuss how each of the three technologies approaches each feature. This manner of presentation enables not only to develop an in-depth understanding of the security mechanism underlying particular LPWA technology but also facilitates comparison of the approaches taken by the technology developers and implementers. Finally, we also take a look in the future – towards the time when LPWA technology might get integrated with the 5G. Specifically, we focus on the the security aspects related to the use of LPWA and IoT as a part of the 5G, identify the gaps and discuss some of the further steps to be taken.",
  address="Academic Press",
  booktitle="LPWAN Technologies for IoT and M2M Applications",
  chapter="159846",
  edition="1st Edition",
  howpublished="online",
  institution="Academic Press",
  year="2020",
  month="march",
  pages="1--25",
  publisher="Academic Press",
  type="book chapter"
}