Module 9: Advanced Assignments

1  LoRaWAN Security

Given the importance of securing data transmitted over a LoRaWAN network, the LoRaWAN specification has been designed from the very beginning to include it. However, the topic of security encompasses multiple properties and, in particular, the cryptographic mechanisms used to implement security in LoRaWAN deserve a careful explanation. The following whitepaper from the LoRa Alliance addresses the security properties embodied in the LoRaWAN specification and how security is implemented.  It also provides some explanations about the LoRaWAN security design.

Read the Whitepaper (Reading Time: 15 minutes)

2. LoRaWAN Security FAQs

For answers to common questions about LoRaWAN security, check out the LoRaWAN Security FAQ.  (Reading Time: 5 minutes)

3. Exploring the Security of LoRaWAN

In addition to looking into the security of LoRaWAN, it is also important to be aware that as with all systems, security vulnerabilities that remain. You should protect your data accordingly. To this end, take a few minutes to read Exploring The Security Vulnerabilities of LoRa by Emekcan Aras, Gowri Sankar Ramachandran, Piers Lawrence, and Danny Hughes. (Reading Time: 30 minutes; Source: iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium.)  (Reading Time: 30 minutes)

4. Securing Your LoRaWAN Implementation

To learn more about maximizing security when implementing a LoRaWAN deployment, read the LoRa Alliance article LoRaWAN® Is Secure (but Implementation Matters). (Reading time: 3 minutes)

5.How Does Encryption Work, and Is It Really Safe?

In this paper, Gavin Phillips explores encryption in detail, explaining both how it works and its effect on securing data.

How Does Encryption Work, and Is It Really Safe? by Gavin Phillips (Reading time: 10 minutes)


Last modified: Tuesday, August 30, 2022, 1:07 AM