z-logo
open-access-imgOpen Access
IoT protection based on Lora Wan
Author(s) -
Yu. Yu. Maslova,
AUTHOR_ID,
Nadiia Dovzhenko,
I. M. Lavrovskyy
Publication year - 2021
Publication title -
sučasnij zahist ìnformacìï
Language(s) - English
Resource type - Journals
ISSN - 2409-7292
DOI - 10.31673/2409-7292.2021.043643
Subject(s) - context (archaeology) , computer science , internet of things , protocol (science) , computer security , software , architecture , operating system , medicine , art , paleontology , alternative medicine , pathology , visual arts , biology
The paper analyzes the life cycle of IOT devices, IOT software development cycle, analyzes threats and technologies of device protection, as well as LoRaWAN protocol, ways of device interaction, network architecture and ways of information protection within this protocol. The main stages of the IOT device life cycle, the stages of IOT software development in the context of information security and the threats that may arise at different stages of the IOT device life cycle are studied. Recommendations and proposals for the organization of processes of interaction with stakeholders, directly on the processes of obtaining a particular IoT device in the security context, and reviewed technologies for the protection of IoT devices based on the LoRaWAN protocol.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here