Improving Hardware Security for LoRaWAN.
Jorge Navarro-OrtizNatalia Chinchilla-RomeroJuan J. Ramos-MuñozPablo Muñoz LuengoPublished in: CSCN (2019)
Keyphrases
- random number generator
- hardware and software
- low cost
- information security
- real time
- intrusion detection
- network security
- trusted computing
- computer security
- functional requirements
- computing power
- security issues
- hardware implementation
- embedded systems
- computer systems
- access control
- security policies
- key management
- security level
- vlsi implementation
- random number
- information assurance
- data acquisition
- security analysis
- authentication protocol
- cyber attacks
- user authentication