Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks.
Stefano TomasinSimone ZulianLorenzo VangelistaPublished in: WCNC Workshops (2017)
Keyphrases
- security analysis
- smart card
- public key
- security requirements
- high security
- image encryption
- user authentication
- mutual authentication
- authentication scheme
- security properties
- encryption scheme
- open source
- mobile devices
- authentication protocol
- key technologies
- query processing
- social networks
- data mining
- ubiquitous computing
- future internet