All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Book on LPWAN Technologies for IoT and M2M Applications: Security in Low Power Wide Area Networks: State-of-the-Art and Development towards the 5G

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F20%3APU134075" target="_blank" >RIV/00216305:26220/20:PU134075 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.elsevier.com/books/lpwan-technologies-for-iot-and-m2m-applications/chaudhari/978-0-12-818880-4" target="_blank" >https://www.elsevier.com/books/lpwan-technologies-for-iot-and-m2m-applications/chaudhari/978-0-12-818880-4</a>

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Book on LPWAN Technologies for IoT and M2M Applications: Security in Low Power Wide Area Networks: State-of-the-Art and Development towards the 5G

  • Original language description

    The chapter delivers the detailed discussion of the potential security threats, features, and mechanisms for the low power wide area (LPWA) networks in general, and the three dominant LPWA technologies - LoRaWAN, cellular Internet of Things (IoT) (e.g., Cat-NB1) and Sigfox, which currently dominate the market, in particular. We start by identifying the key actors, their interrelations and interfaces in the context of a generalized LPWA network architecture, and then determine the potential security threats and attack vectors. Next, we specify sixteen major security features and discuss how each of the three technologies approaches each feature. This manner of presentation enables not only to develop an in-depth understanding of the security mechanism underlying particular LPWA technology but also facilitates comparison of the approaches taken by the technology developers and implementers. Finally, we also take a look in the future – towards the time when LPWA technology might get integrated with the 5G. Specifically, we focus on the the security aspects related to the use of LPWA and IoT as a part of the 5G, identify the gaps and discuss some of the further steps to be taken.

  • Czech name

  • Czech description

Classification

  • Type

    C - Chapter in a specialist book

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

    <a href="/en/project/LO1401" target="_blank" >LO1401: Interdisciplinary Research of Wireless Technologies</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2020

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Book/collection name

    LPWAN Technologies for IoT and M2M Applications

  • ISBN

    978-0-1281-8880-4

  • Number of pages of the result

    25

  • Pages from-to

    1-25

  • Number of pages of the book

    325

  • Publisher name

    Academic Press

  • Place of publication

    Neuveden

  • UT code for WoS chapter