{"title":"物联网安全概述与实践演示","authors":"V. Skorpil, V. Oujezský, Ludek Palenik","doi":"10.1109/ICUMT.2018.8631198","DOIUrl":null,"url":null,"abstract":"This article presents LoRa and LoRaWAN release 1.0 security and vulnerability overview. The practical testing includes Replay attack security weakness and demonstrating and verifying the presented theory. Tests are executed using own constructed LoRa gateway composed of Raspberry Pi and module iC880A. Python scripting is used to generate attacks. The results bring new inside view to the security part of LoRaWanand prove the necessity of a continuing research in the security field to improve services and general awareness.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Internet of Things Security Overview and Practical Demonstration\",\"authors\":\"V. Skorpil, V. Oujezský, Ludek Palenik\",\"doi\":\"10.1109/ICUMT.2018.8631198\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article presents LoRa and LoRaWAN release 1.0 security and vulnerability overview. The practical testing includes Replay attack security weakness and demonstrating and verifying the presented theory. Tests are executed using own constructed LoRa gateway composed of Raspberry Pi and module iC880A. Python scripting is used to generate attacks. The results bring new inside view to the security part of LoRaWanand prove the necessity of a continuing research in the security field to improve services and general awareness.\",\"PeriodicalId\":211042,\"journal\":{\"name\":\"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICUMT.2018.8631198\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICUMT.2018.8631198","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet of Things Security Overview and Practical Demonstration
This article presents LoRa and LoRaWAN release 1.0 security and vulnerability overview. The practical testing includes Replay attack security weakness and demonstrating and verifying the presented theory. Tests are executed using own constructed LoRa gateway composed of Raspberry Pi and module iC880A. Python scripting is used to generate attacks. The results bring new inside view to the security part of LoRaWanand prove the necessity of a continuing research in the security field to improve services and general awareness.