4.2 Article

A Dual Key-Based Activation Scheme for Secure LoRaWAN

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Low Power Wide Area Network Analysis: Can LoRa Scale?

Orestis Georgiou et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2017)

Article Computer Science, Hardware & Architecture

LONG-RANGE COMMUNICATIONS IN UNLICENSED BANDS: THE RISING STARS IN THE IOT AND SMART CITY SCENARIOS

Marco Centenaro et al.

IEEE WIRELESS COMMUNICATIONS (2016)

Article Engineering, Electrical & Electronic

LOW POWER WIDE AREA MACHINE-TO-MACHINE NETWORKS: KEY TECHNIQUES AND PROTOTYPE

Xiong Xiong et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Computer Science, Information Systems

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

Ala Al-Fuqaha et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Theory & Methods

Effective Key Management in Dynamic Wireless Sensor Networks

Seung-Hyun Seo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Engineering, Electrical & Electronic

EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks

Xing Zhang et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2011)