Linked e-resources

Details

Intro
Preface
Acknowledgements
Contents
Editors and Contributors
About the Editors
Contributors
Editorial Board
Acronyms
Part I Preliminaries, Design Principles and Challenges of LPWANs
1 Theoretical Landscape of LPWANs
1.1 Introduction
1.2 Characteristics of Communication Systems
1.2.1 Types of Networks
1.2.1.1 Personal Area Networks
1.2.1.2 Local Area Networks
1.2.1.3 Campus Area Network
1.2.1.4 Metropolitan Area Network
1.2.1.5 Wide Area Network
1.2.2 Entities in Communication Systems
1.2.2.1 Human-to-Human Communication (H2H)

1.2.2.2 Machine-to-Machine Communication (M2M)
1.3 Key Metrics of Communication Technologies
1.3.1 Data Rate
1.3.2 Coverage
1.3.3 Network Densities
1.3.4 Network Architecture
1.3.5 Network Security
1.3.6 Reliability
1.3.7 Chip Size
1.3.8 Energy
1.3.9 Delay
1.4 Characteristics of Applications
1.4.1 Frequency of Activity
1.4.2 Network Lifetime
1.4.3 Network Architecture
1.4.4 Direction of Communication
1.4.5 Traffic
1.4.6 Mobility
1.4.7 Age of Information
1.4.8 Locality of Computations
1.4.9 Locality of Deployment
1.4.10 Reliability

1.4.11 Security
1.4.12 Locality of Energy Source
1.5 Conclusion
References
2 IDS and IPS in LPWAN (LoRaWAN, Sigfox, and NB-IoT)
2.1 Introduction
2.2 Background
2.2.1 LoRaWAN
2.2.1.1 Key Agreement
2.2.1.2 Join Procedure (Activation Methods)
2.2.1.3 Sessions
2.2.2 NB-IoT
2.2.3 Sigfox
2.2.4 Security Considerations
2.2.4.1 Confidentiality and Privacy 2:adefemi2020survey
2.2.4.2 Integrity 2:alaparthy2018study
2.2.4.3 Authentication 2:heeger2020analysis
2.2.4.4 Availability 2:adefemi2020survey
2.3 Security Vulnerabilities and Threats

2.3.1 Physical Altercations
2.3.1.1 Node Tampering
2.3.1.2 Node Deletion and Injection
2.3.1.3 Jamming
2.3.2 Resource Constraints
2.3.3 Software Vulnerabilities
2.3.3.1 Attacks
2.3.3.2 Key Management
2.3.3.3 Cryptographic Primitives
2.3.4 Network-Based Vulnerabilities
2.3.4.1 Open Environment
2.3.4.2 Untrusted Middleware (Gateways) 2:adefemi2020survey
2.3.5 Summary of Vulnerabilities
2.4 Intrusion Detection in LPWAN
2.4.1 Sigfox Based Networks
2.4.2 LoRa Based Networks
2.4.3 NB-IoT Based Networks

2.4.4 Multiple Platforms (More than One Network Architecture)
2.5 Intrusion Prevention Systems for LPWANs
2.5.1 LoRaWAN
2.5.2 Sigfox
2.5.3 NB-IoT
2.5.4 Generic LPWAN
2.6 Challenges and Future Scope
2.7 Conclusion
References
Part II Challenges, Opportunities, Risks and Threats in LPWANs
3 Pervasive LPWAN Connectivity Through LEO Satellites: Trading Off Reliability, Throughput, Latency, and EnergyEfficiency
3.1 Introduction
3.2 LPWAN Technologies: LoRa vs NB-IoT
3.3 Methodological Approach for Performance Evaluation

Browse Subjects

Show more subjects...

Statistics

from
to
Export