Login / Signup
Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches.
Stephan Wesemeyer
Ioana Boureanu
Zach Smith
Helen Treharne
Published in:
EuroS&P (2020)
Keyphrases
</>
key establishment
sensor networks
wireless sensor networks
key management
pairwise
secret key
resource constrained
cryptographic protocols
data sets
sensor data
information security
statistical databases
intrusion detection
symmetric key
key management scheme
energy consumption
ad hoc networks