{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T04:11:56Z","timestamp":1772338316469,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T00:00:00Z","timestamp":1711497600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T00:00:00Z","timestamp":1711497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-02707-6","type":"journal-article","created":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T14:01:42Z","timestamp":1711548102000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Survey on Secure Data Transfer in the Development of Internet of Things (IoT) Applications Using LoRaWAN Technology"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4318-8408","authenticated-orcid":false,"given":"M.","family":"Sowmya","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2352-0714","authenticated-orcid":false,"given":"S. Meenakshi","family":"Sundaram","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6270-6466","authenticated-orcid":false,"given":"Pandiyanathan","family":"Murugesan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,27]]},"reference":[{"key":"2707_CR1","unstructured":"Costa M, Soares P, Monteiro J, Afonso JA (2016). A LoRaWAN-compliant gateway architecture for smart city applications. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) (pp. 294\u2013299). IEEE"},{"key":"2707_CR2","doi-asserted-by":"crossref","unstructured":"Naoui S, Elhdhili ME, Saidane LA (2016) \"Enhancing the security of the IoT LoraWAN architecture.\" 2016 international conference on performance evaluation and modeling in wired and wireless networks (PEMWN). IEEE","DOI":"10.1109\/PEMWN.2016.7842904"},{"key":"2707_CR3","unstructured":"Sorniotti A, Baldini G, Giannetti F (2017). Security in LoRaWAN networks: Vulnerabilities detection and prevention. In 2017 IEEE Symposium on Computers and Communications (ISCC) (pp. 515\u2013520). IEEE"},{"key":"2707_CR4","doi-asserted-by":"crossref","unstructured":"Oniga B, et al (2017) \"Analysis, design and implementation of secure LoRaWAN sensor networks.\" 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE","DOI":"10.1109\/ICCP.2017.8117042"},{"key":"2707_CR5","first-page":"1","volume":"2017","author":"J Kim","year":"2017","unstructured":"Kim J, Song J. \"A dual key-based activation scheme for secure LoRaWAN. Wirel Commun Mob Comput. 2017;2017:1\u201312.","journal-title":"Wirel Commun Mob Comput"},{"key":"2707_CR6","unstructured":"Na S, et al. (2017) \"Scenario and countermeasure for replay attack using join request messages in LoRaWAN.\" 2017 international conference on information networking (ICOIN). IEEE,"},{"key":"2707_CR7","doi-asserted-by":"crossref","unstructured":"Kim J, JooSeok S (2017) \"A simple and efficient replay attack prevention scheme for LoRaWAN.\" Proceedings of the 2017 the 7th International Conference on Communication and Network Security","DOI":"10.1145\/3163058.3163064"},{"key":"2707_CR8","first-page":"121","volume-title":"In proceedings of the 16th International Conference on Information Security","author":"B Oniga","year":"2017","unstructured":"Oniga B, Haller SA, Voicu RC. Security Analysis of LoRaWAN. In: Gollmann D, Miyaji A, Kikuchi H, editors. In proceedings of the 16th International Conference on Information Security. Cham: Springer; 2017. p. 121\u201332."},{"key":"2707_CR9","doi-asserted-by":"publisher","unstructured":"Iskhakov S, Lepp\u00e4nen T, Ometov A (2017). Security vulnerabilities of LoRaWAN. In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (pp. 936\u2013941). ACM. https:\/\/doi.org\/10.1145\/3102304.3102375","DOI":"10.1145\/3102304.3102375"},{"issue":"6","key":"2707_CR10","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1166\/jse.2017.1465","volume":"14","author":"J Kim","year":"2017","unstructured":"Kim J, Song J. A study on the secure LoRaWAN protocol for IoT. J Secur Eng. 2017;14(6):713\u201321. https:\/\/doi.org\/10.1166\/jse.2017.1465.","journal-title":"J Secur Eng"},{"issue":"8","key":"2707_CR11","doi-asserted-by":"crossref","first-page":"2597","DOI":"10.3390\/s18082597","volume":"18","author":"MAU Khan","year":"2018","unstructured":"Khan MAU, et al. A security analysis of LoRaWAN. Sensors. 2018;18(8):2597.","journal-title":"Sensors"},{"issue":"2","key":"2707_CR12","first-page":"828","volume":"8","author":"D Yazar","year":"2018","unstructured":"Yazar D, Sahin AB. LoRaWAN gateway selection using TOPSIS method. Int J Electr Comput Eng. 2018;8(2):828\u201337.","journal-title":"Int J Electr Comput Eng"},{"key":"2707_CR13","unstructured":"Kiani AK, Zubairi J (2018) LoRaWAN for IoT: Energy consumption modeling and analysis. In 2018 IEEE International Conference on Communications (ICC) (pp. 1\u20136). IEEE"},{"key":"2707_CR14","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1016\/j.procs.2018.04.162","volume":"130","author":"C El Fehri","year":"2018","unstructured":"El Fehri C, et al. LoRa technology MAC layer operations and research issues. Proced Comput Sci. 2018;130:1096\u2013101.","journal-title":"Proced Comput Sci"},{"key":"2707_CR15","first-page":"205","volume-title":"\u201cLoRa for the Internet of Things\u201d EAI\/Springer innovations in communication and computing","author":"P Balleri","year":"2018","unstructured":"Balleri P, Conzon D, Guglielmi M. \u201cLoRa for the Internet of Things\u201d EAI\/Springer innovations in communication and computing. Cham: Springer; 2018. p. 205\u201319."},{"key":"2707_CR16","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.jnca.2018.07.005","volume":"116","author":"D Demirbas","year":"2018","unstructured":"Demirbas D, Cetin B, Balta HN. A review of LPWAN technologies for IoT applications. J Netw Comput Appl. 2018;116:67\u201383. https:\/\/doi.org\/10.1016\/j.jnca.2018.07.005.","journal-title":"J Netw Comput Appl"},{"key":"2707_CR17","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.procs.2018.07.143","volume":"134","author":"TCM D\u00f6nmez","year":"2018","unstructured":"D\u00f6nmez TCM, Nigussie E. Security of lorawan v1. 1 in backward compatibility scenarios. Proced Comput Sci. 2018;134:51\u20138.","journal-title":"Proced Comput Sci"},{"key":"2707_CR18","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.3390\/s18061833","volume":"18.6","author":"R Sanchez-Iborra","year":"2018","unstructured":"Sanchez-Iborra R, et al. Enhancing lorawan security through a lightweight and authenticated key management approach. Sensors. 2018;18.6:1833.","journal-title":"Sensors"},{"issue":"5","key":"2707_CR19","doi-asserted-by":"publisher","first-page":"2153","DOI":"10.1109\/JSEN.2017.2789121","volume":"18","author":"J Kim","year":"2018","unstructured":"Kim J, Song J. A secure device-to-device link establishment scheme for LoRaWAN. IEEE Sens J. 2018;18(5):2153\u201360.","journal-title":"IEEE Sens J"},{"key":"2707_CR20","doi-asserted-by":"crossref","unstructured":"Chatzigiannakis I, Liagkou V, Spirakis PG (2018) \"Brief announcement: Providing end-to-end secure communication in low-power wide area networks.\" Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21\u201322, 2018, Proceedings 2. Springer International Publishing","DOI":"10.1007\/978-3-319-94147-9_8"},{"key":"2707_CR21","doi-asserted-by":"publisher","first-page":"45325","DOI":"10.1109\/ACCESS.2018.2852563","volume":"6","author":"K-L Tsai","year":"2018","unstructured":"Tsai K-L, et al. AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access. 2018;6:45325\u201334.","journal-title":"IEEE Access"},{"key":"2707_CR22","doi-asserted-by":"crossref","unstructured":"Yang X, et al. (2018) \"Security vulnerabilities in LoRaWAN.\" 2018 IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE","DOI":"10.1109\/IoTDI.2018.00022"},{"key":"2707_CR23","doi-asserted-by":"crossref","unstructured":"Danish SM, et al. (2018) \"Network intrusion detection system for jamming attack in lorawan join procedure.\" 2018 IEEE International Conference on Communications (ICC). IEEE","DOI":"10.1109\/ICC.2018.8422721"},{"key":"2707_CR24","unstructured":"Hofmann P, Schaffer P, Brunner M, Langer J. (2018). Security in LoRaWAN.Whitepaper. https:\/\/www.everythingrf.com\/whitepapers\/details\/3352-security-in-lorawan"},{"key":"2707_CR25","doi-asserted-by":"publisher","unstructured":"Sanchez-Iborra R, Cano MD, Santa J (2018). Efficient key management scheme for LoRaWAN. In Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 1\u20137). IEEE. https:\/\/doi.org\/10.1109\/CCNC.2018.8319262","DOI":"10.1109\/CCNC.2018.8319262"},{"key":"2707_CR26","doi-asserted-by":"publisher","unstructured":"Kim J, Song J (2018). A replay attack against LoRaWAN. In Proceedings of the 2018 International Conference on Information Networking (ICOIN) (pp. 707\u2013709). IEEE. https:\/\/doi.org\/10.1109\/ICOIN.2018.8343179","DOI":"10.1109\/ICOIN.2018.8343179"},{"key":"2707_CR27","unstructured":"Harwahyu R, Ruki AF, Rizkika LY, Fitriawan H (2018) Development of LoRaWAN-based remote monitoring system using Aloha MAC protocol. In 2018 International Conference on Information and Communications Technology (ICOIACT) (pp. 346\u2013350). IEEE"},{"issue":"9","key":"2707_CR28","doi-asserted-by":"publisher","first-page":"3064","DOI":"10.3390\/s18093064","volume":"18","author":"B Reynders","year":"2018","unstructured":"Reynders B, Torfs W, De Poorter E, Moerman I. A comparative study of LoRaWAN class A protocols for energy-efficient IoT applications. Sensors. 2018;18(9):3064. https:\/\/doi.org\/10.3390\/s18093064.","journal-title":"Sensors"},{"key":"2707_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jii.2018.01.003","volume":"10","author":"Y Zhu","year":"2018","unstructured":"Zhu Y, Wang X, Li H. A survey on blockchain-based smart contracts: applications, challenges, and future trends. J Ind Inf Integr. 2018;10:1\u201311. https:\/\/doi.org\/10.1016\/j.jii.2018.01.003.","journal-title":"J Ind Inf Integr"},{"issue":"3","key":"2707_CR30","first-page":"2234","volume":"21","author":"MA Al-Fuqaha","year":"2019","unstructured":"Al-Fuqaha MA, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Comprehensive survey on LoRaWAN technology: protocol architecture, key features, applications, and open issues. IEEE Commun Surv Tutor. 2019;21(3):2234\u201387.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"2707_CR31","first-page":"481","volume":"105","author":"V Bogdan Oniga","year":"2019","unstructured":"Bogdan Oniga V, Dadarlat SH, Halunga R. A secure LoRaWAN network architecture using remote access VPN. Wireless Pers Commun. 2019;105(2):481\u201394.","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"2707_CR32","doi-asserted-by":"crossref","first-page":"2048","DOI":"10.1109\/JIOT.2018.2875057","volume":"6","author":"S Hasan","year":"2019","unstructured":"Hasan S, Kumar S, Chakraborty S. Multi-hop communication in LoRaWAN: a stochastic optimization approach. IEEE Internet Things J. 2019;6(2):2048\u201359.","journal-title":"IEEE Internet Things J"},{"issue":"14","key":"2707_CR33","doi-asserted-by":"publisher","first-page":"3097","DOI":"10.3390\/s19143097","volume":"19","author":"MA Ert\u00fcrk","year":"2019","unstructured":"Ert\u00fcrk MA, \u015eahing\u00f6z OK, \u00c7a\u011flayan MU. The performance analysis of LoRa and LoRaWAN for sustainable smart city applications. Sensors. 2019;19(14):3097. https:\/\/doi.org\/10.3390\/s19143097.","journal-title":"Sensors"},{"issue":"3","key":"2707_CR34","doi-asserted-by":"publisher","first-page":"2794","DOI":"10.1109\/COMST.2019.2906032","volume":"21","author":"TCM D\u00f6nmez","year":"2019","unstructured":"D\u00f6nmez TCM, Nigussie E. IoT security and privacy: a survey of LoRaWAN. IEEE Commun Surv Tutor. 2019;21(3):2794\u2013820. https:\/\/doi.org\/10.1109\/COMST.2019.2906032.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"14","key":"2707_CR35","doi-asserted-by":"publisher","first-page":"3102","DOI":"10.3390\/s19143102","volume":"19","author":"JM Marais","year":"2019","unstructured":"Marais JM, van Rooyen GJ, Nel W. An adaptive and predictive data rate mechanism for LoRaWAN. Sensors. 2019;19(14):3102. https:\/\/doi.org\/10.3390\/s19143102.","journal-title":"Sensors"},{"key":"2707_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2019.03.016","volume":"135","author":"S Rajaraman","year":"2019","unstructured":"Rajaraman S, Palanisamy B, Kumar KM. A survey on blockchain-based internet of things: Applications, challenges, and future directions. J Netw Comput Appl. 2019;135:1\u201319. https:\/\/doi.org\/10.1016\/j.jnca.2019.03.016.","journal-title":"J Netw Comput Appl"},{"key":"2707_CR37","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.jnca.2019.02.018","volume":"135","author":"X Zhang","year":"2019","unstructured":"Zhang X, Wen Y, Zhang Y. Blockchain based trust management: opportunities and challenges. J Netw Comput Appl. 2019;135:62\u201375. https:\/\/doi.org\/10.1016\/j.jnca.2019.02.018.","journal-title":"J Netw Comput Appl"},{"key":"2707_CR38","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.future.2019.02.026","volume":"97","author":"C Chen","year":"2019","unstructured":"Chen C, Li X, Zhang Y, Yang Y. A survey of blockchain-based systems. Futur Gener Comput Syst. 2019;97:512\u201327. https:\/\/doi.org\/10.1016\/j.future.2019.02.026.","journal-title":"Futur Gener Comput Syst"},{"key":"2707_CR39","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.future.2019.01.064","volume":"95","author":"Q Zhao","year":"2019","unstructured":"Zhao Q, Zhang B, Peng K. A survey on the security of blockchain systems. Futur Gener Comput Syst. 2019;95:399\u2013417. https:\/\/doi.org\/10.1016\/j.future.2019.01.064.","journal-title":"Futur Gener Comput Syst"},{"key":"2707_CR40","first-page":"184288","volume":"8","author":"T Vatandas","year":"2020","unstructured":"Vatandas T, Paverd A, Moessner K, Tafazolli R. Experimental evaluation of LoRaWAN security. IEEE Access. 2020;8:184288\u2013302.","journal-title":"IEEE Access"},{"issue":"6","key":"2707_CR41","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.3390\/electronics9061020","volume":"9","author":"MYB Sheikh","year":"2020","unstructured":"Sheikh MYB, Kim J, Mahmud MA, Huh EN. A survey on LoRaWAN for IoT: applications, prospects, and challenges. Electronics. 2020;9(6):1020.","journal-title":"Electronics"},{"key":"2707_CR42","volume":"146","author":"AT Balaji","year":"2020","unstructured":"Balaji AT, Sekaran KC, Vairavasundaram S. LoRaWAN: a low power wide area network for IoT applications. J Netw Comput Appl. 2020;146: 102436.","journal-title":"J Netw Comput Appl"},{"key":"2707_CR43","unstructured":"Stranahan J, John A (2020) LoRaWAN device security and energy optimization. Rowan University"},{"issue":"11","key":"2707_CR44","first-page":"10898","volume":"7","author":"Y Hu","year":"2020","unstructured":"Hu Y, Liu J, Li J, Gao Y, Tan Z. A gateway selection algorithm for LoRaWAN networks based on signal quality and availability. IEEE Internet Things J. 2020;7(11):10898\u2013908.","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"2707_CR45","first-page":"3655","volume":"7","author":"ASU Kumara","year":"2020","unstructured":"Kumara ASU, Jayasinghe L, Kodituwakku SN. A novel gateway placement algorithm for LoRaWAN networks. IEEE Internet Things J. 2020;7(5):3655\u201366.","journal-title":"IEEE Internet Things J"},{"issue":"14","key":"2707_CR46","doi-asserted-by":"publisher","first-page":"4012","DOI":"10.3390\/s20144012","volume":"20","author":"R Kufakunesu","year":"2020","unstructured":"Kufakunesu R, Hancke GP, Abu-Mahfouz AM. Performance analysis of LoRaWAN for internet of things applications: a case study. Sensors. 2020;20(14):4012. https:\/\/doi.org\/10.3390\/s20144012.","journal-title":"Sensors"},{"issue":"9","key":"2707_CR47","doi-asserted-by":"publisher","first-page":"700","DOI":"10.12720\/jcm.15.9.700-706","volume":"15","author":"JA Stranahan Jr","year":"2020","unstructured":"Stranahan JA Jr. Analysis of MQTT-SN and LoRaWAN for Industrial IoT. J Commun. 2020;15(9):700\u20136. https:\/\/doi.org\/10.12720\/jcm.15.9.700-706.","journal-title":"J Commun"},{"issue":"3","key":"2707_CR48","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1007\/s12652-019-01374-x","volume":"11","author":"MNI Khan","year":"2020","unstructured":"Khan MNI, Islam MS, Ullah R. Ant colony optimization-based routing protocol for energy-efficient communication in LoRaWAN. J Ambient Intell Humaniz Comput. 2020;11(3):1153\u201365. https:\/\/doi.org\/10.1007\/s12652-019-01374-x.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2707_CR49","doi-asserted-by":"publisher","first-page":"100120","DOI":"10.1016\/j.jii.2019.100120","volume":"17","author":"K Tiwari","year":"2020","unstructured":"Tiwari K, Goyal M, Singh S. A survey on blockchain technology for industry 4.0: Applications, challenges and future directions. J Ind Inform Integr. 2020;17:100120. https:\/\/doi.org\/10.1016\/j.jii.2019.100120.","journal-title":"J Ind Inform Integr"},{"key":"2707_CR50","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1016\/j.future.2020.01.052","volume":"108","author":"Z Cai","year":"2020","unstructured":"Cai Z, Zhang Y, Liu W, Zhang J. Blockchain-based data integrity service framework for industrial Internet of Things. Futur Gener Comput Syst. 2020;108:714\u201322. https:\/\/doi.org\/10.1016\/j.future.2020.01.052.","journal-title":"Futur Gener Comput Syst"},{"key":"2707_CR51","doi-asserted-by":"publisher","first-page":"102583","DOI":"10.1109\/ACCESS.2020.2991955","volume":"8","author":"Y Liu","year":"2020","unstructured":"Liu Y, Zheng Z, Chen H, Li X. A survey of blockchain security: from consensus to smart contracts. IEEE Access. 2020;8:102583\u2013601. https:\/\/doi.org\/10.1109\/ACCESS.2020.2991955.","journal-title":"IEEE Access"},{"key":"2707_CR52","doi-asserted-by":"publisher","first-page":"116083","DOI":"10.1109\/ACCESS.2020.3002000","volume":"8","author":"X Lu","year":"2020","unstructured":"Lu X, Liang H, Li L. A survey on blockchain technology for data management in Internet of Things. IEEE Access. 2020;8:116083\u2013101. https:\/\/doi.org\/10.1109\/ACCESS.2020.3002000.","journal-title":"IEEE Access"},{"key":"2707_CR53","volume":"190","author":"SS Sahoo","year":"2021","unstructured":"Sahoo SS, Khuntia SK, Patnaik S. LoRaWAN: a study on the technology and its applications for IoT. Comput Netw. 2021;190: 108042.","journal-title":"Comput Netw"},{"issue":"3","key":"2707_CR54","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.3390\/s21031009","volume":"21","author":"N Alharbi","year":"2021","unstructured":"Alharbi N, Alharbi S, Fortino G. A survey on LoRaWAN: architecture, applications, and research challenges. Sensors. 2021;21(3):1009.","journal-title":"Sensors"},{"issue":"5","key":"2707_CR55","first-page":"3581","volume":"8","author":"MA Hossain","year":"2021","unstructured":"Hossain MA, Al-Fuqaha A, Guizani M, Mohammadi M. Design and implementation of a smart waste management system using LoRaWAN technology. IEEE Internet Things J. 2021;8(5):3581\u201390.","journal-title":"IEEE Internet Things J"},{"key":"2707_CR56","first-page":"56537","volume":"9","author":"S Ahmed","year":"2021","unstructured":"Ahmed S, Akbar MA, Anjum A, Saeed U. An IoT-based low-cost air pollution monitoring system using LoRaWAN technology. IEEE Access. 2021;9:56537\u201348.","journal-title":"IEEE Access"},{"issue":"2","key":"2707_CR57","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1049\/ntw2.12002","volume":"10","author":"MM Ali","year":"2021","unstructured":"Ali MM, Javaid N, Ahmed A, Ahmad I, Khan ZA. Energy-aware gateway placement algorithm for LoRaWAN-based internet of things. IET Netw. 2021;10(2):43\u201350.","journal-title":"IET Netw"},{"key":"2707_CR58","first-page":"58906","volume":"9","author":"J Sun","year":"2021","unstructured":"Sun J, Cui L, Cai Z. An energy-efficient gateway selection algorithm for LoRaWAN based on quality of service. IEEE Access. 2021;9:58906\u201316.","journal-title":"IEEE Access"},{"issue":"2","key":"2707_CR59","doi-asserted-by":"publisher","first-page":"003685042098024","DOI":"10.1177\/0036850420980241","volume":"104","author":"SU Khan","year":"2021","unstructured":"Khan SU, Khan MU, Zaheer R, Khan S. Blockchain technology: trends, challenges, and prospects. Sci Prog. 2021;104(2):0036850420980241. https:\/\/doi.org\/10.1177\/0036850420980241.","journal-title":"Sci Prog"},{"key":"2707_CR60","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102263","volume":"56","author":"A Kumar","year":"2021","unstructured":"Kumar A, Kumari S, Choudhary R. A survey on consensus algorithms in blockchain. Int J Inf Manage. 2021;56: 102263. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2020.102263.","journal-title":"Int J Inf Manage"},{"issue":"11","key":"2707_CR61","doi-asserted-by":"publisher","first-page":"8997","DOI":"10.1016\/j.aej.2022.02.035","volume":"61","author":"M Mehic","year":"2022","unstructured":"Mehic M, et al. LoRaWAN end nodes: security and energy efficiency analysis. Alex Eng J. 2022;61(11):8997\u20139009.","journal-title":"Alex Eng J"},{"key":"2707_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3561973","volume":"18","author":"F Hessel","year":"2022","unstructured":"Hessel F, Almon L, Hollick M. LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation. ACM Trans Sens Netw (TOSN). 2022;18:1\u201355.","journal-title":"ACM Trans Sens Netw (TOSN)."},{"key":"2707_CR63","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102429","volume":"110","author":"M Mehic","year":"2022","unstructured":"Mehic M, Begovic I, Omanovic S, Suljanovic N. Security issues in LoRaWAN networks: a survey. Comput Secur. 2022;110: 102429. https:\/\/doi.org\/10.1016\/j.cose.2021.102429.","journal-title":"Comput Secur"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02707-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-02707-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02707-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T14:08:57Z","timestamp":1711548537000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-02707-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,27]]},"references-count":63,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["2707"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-02707-6","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,27]]},"assertion":[{"value":"2 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"342"}}