Related references
Note: Only part of the references are listed.Experimental Investigation on Wireless Key Generation for Low-Power Wide-Area Networks
Henri Ruotsalainen et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions
Gaurav Pathak et al.
ELECTRONICS (2020)
Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices
Ahmed Mostafa et al.
SENSORS (2020)
Efficient and secure message authentication algorithm at the physical layer
Hassan N. Noura et al.
WIRELESS NETWORKS (2020)
LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations
Bharat S. Chaudhari et al.
FUTURE INTERNET (2020)
Physical Layer Security for the Internet of Things: Authentication and Key Generation
Junqing Zhang et al.
IEEE WIRELESS COMMUNICATIONS (2019)
A comparative study of LPWAN technologies for large-scale IoT deployment
Kais Mekki et al.
ICT EXPRESS (2019)
Security Risk Analysis of LoRaWAN and Future Directions
Ismail Butun et al.
FUTURE INTERNET (2019)
Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique
Mohammed Alshahrani et al.
INTERNET OF THINGS (2019)
An Enhanced Key Management Scheme for LoRaWAN
Jialuo Han et al.
CRYPTOGRAPHY (2018)
A Dual Key-Based Activation Scheme for Secure LoRaWAN
Jaehyu Kim et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2017)
Secure routing for internet of things: A survey
David Airehrour et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
State of the Art in LP-WAN Solutions for Industrial IoT Services
Ramon Sanchez-Iborra et al.
SENSORS (2016)
Key Generation From Wireless Channels: A Review
Junqing Zhang et al.
IEEE ACCESS (2016)
OpenFlow: Enabling innovation in campus networks
Nick McKeown et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2008)