A survey on the security of low power wide area networks: Threats, challenges, and potential solutions

Kuburat Oyeranti Adefemi Alimi, Khmaies Ouahada, Adnan M. Abu-Mahfouz, Suvendi Rimer

Research output: Contribution to journalReview articlepeer-review

33 Citations (Scopus)

Abstract

Low power wide area network (LPWAN) is among the fastest growing networks in Internet of Things (IoT) technologies. Owing to varieties of outstanding features which include long range communication and low power consumption, LPWANs are fast becoming the most widely deployed connectivity standards in IoT domain. However, this promising network are exposed to various security and privacy threats and challenges. For reliable connectivity within networks, the security and privacy challenges need to be effectively addressed with proper mitigation protocol in place. In this paper, a comprehensive review on the security feature of LPWAN is presented. The paper mainly focuses on analyzing LPWAN’s key cybersecurity architecture and it present a significant emphasis on how the LPWAN is highly attractive to intruders and attackers. This paper aims at summarizing recent research works on key LPWAN security challenges such as replay attack, denial-of-service attack, worm hole attack, and eavesdropping attack, the effect of the attacks, and most importantly the various approaches proposed in the literature for the attacks’ mitigation. The paper concludes by highlighting major research gaps and future directions for the successful deployment of LPWAN.

Original languageEnglish
Article number5800
Pages (from-to)1-19
Number of pages19
JournalSensors
Volume20
Issue number20
DOIs
Publication statusPublished - 2 Oct 2020

Keywords

  • Attacks
  • CIA triad
  • Internet of Things (IoT)
  • Low power wide area network
  • Security
  • Sigfox

ASJC Scopus subject areas

  • Analytical Chemistry
  • Information Systems
  • Atomic and Molecular Physics, and Optics
  • Biochemistry
  • Instrumentation
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'A survey on the security of low power wide area networks: Threats, challenges, and potential solutions'. Together they form a unique fingerprint.

Cite this