IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Implications of Cybersecurity Breaches in LPWANs

Implications of Cybersecurity Breaches in LPWANs
View Sample PDF
Author(s): Åke Axeland (Chalmers University of Technology, Sweden), Henrik Hagfeldt (Chalmers University of Technology, Sweden), Magnus Carlsson (Chalmers University of Technology, Sweden), Lina Lagerquist Sergel (Chalmers University of Technology, Sweden)and Ismail Butun (Chalmers University of Technology, Sweden & Konya Food and Agriculture University, Turkey & Royal University of Technology, Sweden)
Copyright: 2021
Pages: 18
Source title: Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities
Source Author(s)/Editor(s): Ismail Butun (Chalmers University of Technology, Sweden & Konya Food and Agriculture University, Turkey & Royal University of Technology, Sweden)
DOI: 10.4018/978-1-7998-7468-3.ch001

Purchase

View Implications of Cybersecurity Breaches in LPWANs on the publisher's website for pricing and purchasing information.

Abstract

With the contrast of limited performance and big responsibility of IoT devices, potential security breaches can have serious impacts in means of safety and privacy. Potential consequences of attacks on IoT devices could be leakage of individuals daily habits and political decisions being influenced. While the consequences might not be avoidable in their entirety, adequate knowledge is a fundamental part of realizing the importance of IoT security and during the assessment of damages following a breach. This chapter will focus on two low-powered wide area network (LPWAN) technologies, narrow-band iot (NB-IoT) and long-range wide area network (LoRaWAN). Further, three use cases will be considered—healthcare, smart cities, and industry—which all to some degree rely on IoT devices. It is shown that with enough knowledge of possible attacks and their corresponding implications, more secure IoT systems can be developed.

Related Content

Okure Udo Obot, Kingsley Friday Attai, Gregory O. Onwodi. © 2023. 28 pages.
Thomas M. Connolly, Mario Soflano, Petros Papadopoulos. © 2023. 29 pages.
Dmytro Dosyn. © 2023. 26 pages.
Jan Kalina. © 2023. 21 pages.
Avishek Choudhury, Mostaan Lotfalian Saremi, Estfania Urena. © 2023. 20 pages.
Yuanying Qu, Xingheng Wang, Limin Yu, Xu Zhu, Wenwu Wang, Zhi Wang. © 2023. 26 pages.
Yousra Kherabi, Damien Ming, Timothy Miles Rawson, Nathan Peiffer-Smadja. © 2023. 10 pages.
Body Bottom