[1] |
NEUMANN P , MONTAVONT J , NO?L T , . Indoor deployment of low-power wide area networks (LPWAN):a LoRaWAN case study[C]// 2016 IEEE 12th International Conference on Wireless and Mobile Computing,Networking and Communications (WiMob). Piscataway:IEEE Press, 2016: 1-8.
|
[2] |
SANCHEZ-IBORRA R , SáNCHEZ-GóMEZ J , PéREZ S ,et al. Enhancing LoRaWAN security through a lightweight and authenticated key management approach[J]. Sensors, 2018,18(6): 1833.
|
[3] |
ZULIAN S . Security threat analysis and countermeasures for LoRaWAN join procedure[EB]. 2015.
|
[4] |
KIM J , SONG J . A dual key-based activation scheme for secure LoRaWAN[J]. Wireless Communications and Mobile Computing, 2017,2017: 1-12.
|
[5] |
ARAS E , RAMACHANDRAN G S , LAWRENCE P ,et al. Exploring the security vulnerabilities of LoRa[C]// 2017 3rd IEEE International Conference on Cybernetics (CYBCONF). Piscataway:IEEE Press, 2017: 1-6.
|
[6] |
DANEV B , ZANETTI D , CAPKUN S . On physical-layer identification of wireless devices[J]. ACM Computing Surveys, 2012,45(1): 1-29.
|
[7] |
袁红林, 胡爱群 . 射频指纹的产生机理与惟一性[J]. 东南大学学报(自然科学版), 2009,39(2): 230-233.
|
|
YUAN H L , HU A Q . Fountainhead and uniqueness of RF fingerprint[J]. Journal of Southeast University (Natural Science Edition), 2009,39(2): 230-233.
|
[8] |
DE CARVALHO SILVA J , RODRIGUES J J P C , ALBERTI A M ,et al. LoRaWAN—A low power WAN protocol for Internet of Things:a review and opportunities[C]// 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech). Piscataway:IEEE Press, 2017: 1-6.
|
[9] |
BEHRAD S , TUFFIN S , BERTIN E ,et al. Network access control for the IoT:a comparison between cellular,Wi-Fi and LoRaWAN[C]// 2019 22nd Conference on Innovation in Clouds,Internet and Networks and Workshops (ICIN). Piscataway:IEEE Press, 2019: 195-200.
|
[10] |
SANTAMARIA M , MARCHIORI A . Demystifying LoRa WAN security and capacity[C]// 2019 29th International Telecommunication Networks and Applications Conference (ITNAC). Piscataway:IEEE Press, 2019: 1-7.
|
[11] |
YANG X Y , KARAMPATZAKIS E , DOERR C ,et al. Security vulnerabilities in LoRaWAN[C]// 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). Piscataway:IEEE Press, 2018: 129-140.
|
[12] |
SANCHEZ-IBORRA R , SáNCHEZ-GóMEZ J , PEREZ S ,et al. Internet access for LoRaWAN devices considering security issues[C]// 2018 Global Internet of Things Summit (GIoTS). Piscataway:IEEE Press, 2018: 1-6.
|
[13] |
BUTUN I , PEREIRA N , GIDLUND M . Security risk analysis of LoRaWAN and future directions[J]. Future Internet, 2018,11(1): 3.
|
[14] |
BASU D , GU T B , MOHAPATRA P ,et al. Security issues of low power wide area networks in the context of LoRanetworks[EB]. 2020.
|
[15] |
CHACKO S , JOB M D . Security mechanisms and Vulnerabilities in LPWAN[J]. IOP Conference Series:Materials Science and Engineering, 2018,396:012027.
|
[16] |
VANGELISTA L . Frequency shift chirp modulation:the LoRa modulation[J]. IEEE Signal Processing Letters, 2017,24(12): 1818-1821.
|
[17] |
DEMERS F , ST-HILAIRE M ,, . Radiometric identification of LTE transmitters[C]// 2013 IEEE Global Communications Conference (GLOBECOM). Piscataway:IEEE Press, 2013: 4116-4121.
|
[18] |
ROMERO H P , REMLEY K A , WILLIAMS D F ,et al. Electromagnetic measurements for counterfeit detection of radio frequency identification cards[J]. IEEE Transactions on Microwave Theory and Techniques, 2009,57(5): 1383-1387.
|
[19] |
PENG L N , HU A Q , JIANG Y ,et al. A differential constellation trace figure based device identification method for ZigBee nodes[C]// 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP). Piscataway:IEEE Press, 2016.
|
[20] |
CHEONG P S , BERGS J , HAWINKEL C ,et al. Comparison of LoRaWAN classes and their power consumption[C]// 2017 IEEE Symposium on Communications and Vehicular Technology (SCVT). Piscataway:IEEE Press, 2017: 1-6.
|
[21] |
GHANAATIAN R , AFISIADIS O , COTTING M ,et al. Lora digital receiver analysis and implementation[C]// ICASSP 2019-2019 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP). Piscataway:IEEE Press, 2019.
|
[22] |
JOACHIM T . Complete reverse engineering of LoRa PHY[EB]. 2019.
|