All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Security in low-power wide-area networks: state-of-the-art and development toward the 5G

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F20%3APU147864" target="_blank" >RIV/00216305:26220/20:PU147864 - isvavai.cz</a>

  • Result on the web

    <a href="https://www.sciencedirect.com/science/article/pii/B9780128188804000181?via%3Dihub" target="_blank" >https://www.sciencedirect.com/science/article/pii/B9780128188804000181?via%3Dihub</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1016/B978-0-12-818880-4.00018-1" target="_blank" >10.1016/B978-0-12-818880-4.00018-1</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Security in low-power wide-area networks: state-of-the-art and development toward the 5G

  • Original language description

    The chapter delivers the detailed discussion of the potential security threats, features, and mechanisms for the low-power wide-area (LPWA) networks in general, and the three dominant LPWA technologies—long-range wide-area network, cellular Internet of things (IoT) (e.g., Cat-NB1), and Sigfox, which currently dominate the market, in particular. We start by identifying the key actors, their interrelations, and interfaces in the context of a generalized LPWA network architecture and then determine the potential security threats and attack vectors. Next, we specify 16 major security features and discuss how each of the three technologies approaches each feature. This manner of presentation enables not only to develop an in-depth understanding of the security mechanism underlying particular LPWA technology but also facilitates comparison of the approaches taken by the technology developers and implementers. Finally, we also take a look in the future—toward the time when LPWA technology might get integrated with the 5G. Specifically, we focus on the security aspects related to the use of LPWA and IoT as a part of the 5G, identify the gaps, and discuss some of the further steps to be taken.

  • Czech name

  • Czech description

Classification

  • Type

    C - Chapter in a specialist book

  • CEP classification

  • OECD FORD branch

    20200 - Electrical engineering, Electronic engineering, Information engineering

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2020

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Book/collection name

    LPWAN Technologies for IoT and M2M Applications

  • ISBN

    9780128188811

  • Number of pages of the result

    24

  • Pages from-to

    373-396

  • Number of pages of the book

    456

  • Publisher name

    Elsevier

  • Place of publication

    Neuveden

  • UT code for WoS chapter