АНАЛІЗ БЕЗПЕКИ ІНТЕРНЕТУ РЕЧЕЙ ЗА ТЕХНОЛОГІЄЮ LORAWAN
Ключові слова:
БЕЗПРОВОДОВА МЕРЕЖА, ІНТЕРНЕТ РЕЧЕЙ, LoRaWAN, БЕЗПЕКААнотація
The analysis of security Internet of Things on technology LoRaWAN
The theme of security is topical in almost any area of the Internet, Internet of Things (IoT) and Industrial Internet of Things (IIoT). Security has not always been taken into account when developing products. This is a big problem that deserves attention. Some IoT products come with outdated operating systems in their embedded form. Thus, all the benefits of new technologies should be achieved only in a safe environment.
Посилання
Security in LoRaWAN Applications (2018). [Online]. Available: https://smartmakers.io/en/ security-in-lorawan-applications/, Accessedon: Oct. 9,2018.
R. Miller. (2016, June). LoRa Security Building a Secure LoRa Solution. Presented at BSides 2016 Conference. [Online]. Available: http://bit.ly/ mwr-lora-security, Accessed on: Jun. 5, 2017.
J. Daemen, V. Rijmen, The Design of Rijndael, AES - The Advanced Encryption Standard. Springer-Verlag, Berlin, Heidelberg, Germany, 2002.
LoRa specification provided by LoRa Alliance (2015). [Online]. Available: http://bit.ly/LoRaWAN-specification,Accessedon:Jun.1,2017.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2019 Олексій Олександрович Рибак, Дмитро Анатолійович Міночкін
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.