Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/23366
DC FieldValueLanguage
dc.contributor.advisorLambrinos, Lambros-
dc.contributor.authorPanagi, Andreas-
dc.date.accessioned2021-10-22T10:29:50Z-
dc.date.available2021-10-22T10:29:50Z-
dc.date.issued2021-05-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/23366-
dc.description.abstractInternet of Things (IoT) comprises devices that can communicate with each other and the computing infrastructure. IoT devices are used mostly for automatization, they gather information, analyze it, and create an action. LPWAN is a networking infrastructure solution for the Internet of Things. It is a relatively new class of wireless communication systems designed for long-range and low-power performance meaning they transmit data slower but with long-range and low battery usage. There are several LPWAN protocols, such as SigFox, DASH7, NB-IoT, and LoRaWAN. LoRaWAN is gaining a lot of traction from the manufacturing and academic communities due to its low implementation costs and scalable network-layer protocols. For this thesis, we have focused on the LoRaWAN protocol. It has seen fast acceptance in the world of IoT since its introduction in 2015. However, since LoRaWAN is still relatively new, its extent of protection has not been thoroughly researched. The main objective of this thesis is the examination of the LoRaWAN operations and the security features, namely activation methods, security keys, protocol architecture, and security architecture. Additionally, the range and coverage of LoRa devices manufactured by the “The Things Network” community have been tested. Furthermore, we have discovered and analyzed a few vulnerabilities of LoRaWAN. Experimental validation for each attack has been executed in a controlled environment and with the use of references. Finally, we have discussed the best practices for better connectivity between the sensors and gateways and how these attacks can be mitigated or protected against.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.publisherqen_US
dc.rightsΑπαγορεύεται η δημοσίευση ή αναπαραγωγή, ηλεκτρονική ή άλλη χωρίς τη γραπτή συγκατάθεση του δημιουργού και κάτοχου των πνευματικών δικαιωμάτων.en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectIoTen_US
dc.subjectLPWANen_US
dc.subjectLoRaen_US
dc.subjectVulnerabilitiesen_US
dc.subjectCommunication Featuresen_US
dc.titleExploring Communication Features and Security Vulnerabilities of Long-Range (LoRa) Networksen_US
dc.typeBachelors Thesisen_US
dc.affiliationCyprus University of Technologyen_US
dc.relation.deptDepartment of Communication and Internet Studiesen_US
dc.description.statusCompleteden_US
cut.common.academicyear2020-2021en_US
dc.relation.facultyFaculty of Communication and Internet Studiesen_US
item.openairetypebachelorThesis-
item.cerifentitytypePublications-
item.fulltextWith Fulltext-
item.grantfulltextopen-
item.openairecristypehttp://purl.org/coar/resource_type/c_46ec-
item.languageiso639-1en-
crisitem.author.deptDepartment of Communication and Internet Studies-
crisitem.author.facultyFaculty of Communication and Media Studies-
crisitem.author.orcid0000-0002-6810-1479-
crisitem.author.parentorgFaculty of Communication and Media Studies-
Appears in Collections:Πτυχιακές Εργασίες/ Bachelor's Degree Theses
Files in This Item:
File Description SizeFormat
Abstract AndreasPanagi_Thesis(Final).pdf56.31 kBAdobe PDFView/Open
CORE Recommender
Show simple item record

Page view(s) 50

226
Last Week
0
Last month
4
checked on Jan 30, 2025

Download(s) 50

154
checked on Jan 30, 2025

Google ScholarTM

Check


This item is licensed under a Creative Commons License Creative Commons