References
- Ministry of the Interior and Safety. (2019. 07. 01.). Guidelines for the introduction of the government IoT. Retrieved from https://www.mois.go.kr/
- Gareth Halfacree. (2020. 01. 28.). IOActive Highlights Security Failings in LoraWAN Deployments, Publishes Auditing Framework. Retrieved from https://www.hackster.io/
- ETRI. (2018. 07. 10.). Development of LPWAN security technology based on Hardware Security Module for safe IoT devices, Retrieved from https://scienceon.kisti.re.kr/
- Kim, S. E. (2017. 08. 10.). Security platform IoT dedicated network solution, LoRa certification, Retrieved from https://www.datanet.co.kr/
- Lee, S. M. (2020. 10. 13.). Microchip Introduces Wi-Fi MCU Module to Improve IoT Security, Retrieved from https://www.e4ds.com/
- Mah, S.-H., & Kim, B.-S. (2019). Lora Technology Analysis and Lora Use Case Analysis By Country. The Journal of The Institute of Internet, Broadcasting and Communication, 19(1), 15-20. DOI : 10.7236/JIIBC.2019.19.1.15
- Lee, D. H., Jang, G. H., Lee, C., Lee, Y. S., Lee, C. H., Kim, N. G., & Cho, S. R. (2020). Investigation on Low Power Communication for Power-Efficient Communication. Journal of Korean Institute of Communications and Information Sciences, 45(5), 805-812. DOI : 10.7840/kics.2020.45.5.805
- Actility, (2019. 07. 01.). The LoraWAN Network Server is the brain and the controller of a LoraWAN network, Retrieved from https://www.actility.com/
- Mun, T. H., & Kim, J. H. (2017). SK Telecom IoT dedicated network (Lora & LTE-M) construction and business status. Information and Communications Magazine, 34(2), 3-5.
- Proxis. (2020. 01. 28.). Articles and Reports IOActive security researchers say LoraWAN networks are vulnerable to cyber-attacks Retrieved from https://www.proxis.ua/
- LoRa Alliance, (2017. 07. 01.). lorawan_security_whitepaper, Retrieved from https://lora-alliance.org/
- Ann R. Thryft, (2020. 03. 05.). Key management concerns impact LoraWAN IoT device security, Retrieved from https://www.embedded.com/
- Kim. H. G. (2018). Research on Authentication and Key Agreement in a wireless sensor network under 1 Kbps communication capability. Kookmin University Graduate School of Financial Information Security Master's Thesis.
- Kim., J. H. (2018). Practical security improvement for LoraWAN communication. Yonsei University, Computer Science Ph.D. Thesis.
- Lee., J. H. (2018). The Security Vulnerability Analysis and Countermeasure Against Replay-attack in LoraWAN. Ajou University, Graduate School of Computer Science Master's thesis.
- Jeon, S. H., Kim, S. G. (2021). A Design of Blockchain-based Lora Multi-hop Network for Smart Grid. Journal of the Korea Institute of Information and Communication Engineering, 25(3), 440-448. DOI : 10.6109/jkiice.2021.25.3.440
- Yu Jiang, Hua Fu, Aiqun Hu, Wen Sun, (2021). A Lora-Based Lightweight Secure Access Enhancement System, Security and Communication Networks, vol. 2021, 16. DOI : 10.1155/2021/3530509
- Kaven, S., Bornholdt, L., & Skwarek, V. (2021). Authentication by rssi-position based localization in a Lora lpwan. In 2020 6th IEEE Congress on Information Science and Technology (CiSt), 448-454. DOI : 10.1109/ACCESS.2019.2929212
- Danish, S. M., Lestas, M., Asif, W., Qureshi, H. K., & Rajarajan, M. (2019). A lightweight blockchain based two factor authentication mechanism for LoraWAN join procedure. In 2019 IEEE International Conference on Communications Workshops (ICC Workshops). 1-6. DOI : 10.1109/ICCW.2019.8756673
- Jung, H. T., Lee, S. H., & Kim, K. C. (2019). Implement Detecting Network Attack through Machine Learning in LoraWAN Environment. Journal of Korean Institute of Communications and Information Sciences, 44(8), 1547-1555. DOI : 10.7840/kics.2019.44.8.1547
- Sanchez-Iborra, R., Sanchez-Gomez, J., Perez, S., Fernandez, P. J., Santa, J., Hernandez-Ramos, J. L., & Skarmeta, A. F. (2018). Enhancing Lorawan security through a lightweight and authenticated key management approach. Sensors, 18(6), 1833. DOI : 10.3390/s18061833
- Anastasiou, A., Christodoulou, P., Christodoulou, K., Vassiliou, V., & Zinonos, Z. (2020, May). Iot device firmware update over Lora: The blockchain solution. In 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS), 404-411. DOI : 10.1109/DCOSS49796.2020.00070
- Ribeiro, V., Holanda, R., Ramos, A., & Rodrigues, J. J. (2020). Enhancing key management in LoraWAN with permissioned blockchain. Sensors, 20(11), 3068. DOI : 10.3390/s20113068
- Tsai, Kun-Lin & Leu, Fang-Yie & Hung, Li-Ling & Ko, Chia-Yin. (2020). Secure Session Key Generation Method for LoraWAN Servers. IEEE Access. PP. 1-1. DOI : 10.1109/ACCESS.2020.2978100