{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T22:17:22Z","timestamp":1770675442514,"version":"3.49.0"},"reference-count":104,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,2,1]]},"DOI":"10.1109\/jiot.2025.3633940","type":"journal-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T18:42:32Z","timestamp":1763404952000},"page":"3827-3849","source":"Crossref","is-referenced-by-count":0,"title":["Securing LoRaWAN in the AIoT Era: A Systematic Mapping Study and an MITRE-Based Threat Matrix"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7586-6665","authenticated-orcid":false,"given":"Elis\u00e9e","family":"Toe","sequence":"first","affiliation":[{"name":"Universit&#x00E9; du Qu&#x00E9;bec &#x00E1; Chicoutimi, Saguenay, QC, Canada"}]},{"given":"Fehmi","family":"Jaafar","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; du Qu&#x00E9;bec &#x00E1; Chicoutimi, Saguenay, QC, Canada"}]},{"given":"Laurent","family":"Charles Andr\u00e9 Ferrier","sequence":"additional","affiliation":[{"name":"C&#x00E9;gep de Sept-&#x00CE;les, Sept-&#x00CE;les, QC, Canada"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Hype Cycle for Wireless Technologies","author":"Jones","year":"2024"},{"key":"ref2","volume-title":"LoRa Alliance End-of-Year Report 2024","year":"2024"},{"issue":"1","key":"ref3","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1109\/COMST.2022.3229846","article-title":"A comprehensive study on LPWANs with a focus on the potential of LoRa\/LoRaWAN systems","volume":"25","author":"Milarokostas","year":"2023","journal-title":"IEEE Commun. Surveys Tuts."},{"key":"ref4","first-page":"1","article-title":"Confirmed traffic in LoRaWAN: Pitfalls and countermeasures","volume-title":"Proc. 17th Annu. Medit. Ad Hoc Netw. Workshop (Med-Hoc-Net)","author":"Capuzzo"},{"issue":"1","key":"ref5","first-page":"47","article-title":"LoRaWAN security","volume":"9","author":"Seller","year":"2021","journal-title":"J. ICT Standardization"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-54049-3","volume":"1147","author":"Karner","year":"2024","journal-title":"Intelligent Secure Trustable Things"},{"key":"ref7","first-page":"1183","article-title":"Learning-automata-based hybrid model for event detection in LoRaWAN networks","volume-title":"Proc. IEEE 21st Medit. Electrotechnical Conf. (MELECON)","author":"Tsakmakis"},{"issue":"6","key":"ref8","doi-asserted-by":"crossref","first-page":"6795","DOI":"10.1109\/TVT.2022.3163786","article-title":"Tiny machine learning (Tiny-ML) for efficient channel estimation and signal detection","volume":"71","author":"Liu","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"4578","DOI":"10.1109\/OJCOMS.2024.3433502","article-title":"A tutorial on chirp spread spectrum modulation for LoRaWAN: Basics and key advances","volume":"5","author":"Maleki","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref10","volume-title":"LoRa and LoRawan","year":"2024"},{"key":"ref11","first-page":"1","article-title":"An adaptive and lightweight spreading factor assignment scheme for LoRaWAnNetworks","volume-title":"Proc. 14th Int. Conf. Open Source Syst. Technol. (ICOSST)","author":"Farhad"},{"key":"ref12","first-page":"1","article-title":"Empirical analysis of LoRaWAN-based adaptive data rate algorithms","volume-title":"Proc. 47th Annu. Conf. IEEE Ind. Electron. Soc.","author":"Charles"},{"key":"ref13","volume-title":"LoRaWAN","year":"2025"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1201\/9781003430018","volume-title":"Artificial Intelligence of Things (AIoT): New Standards, Technologies and Communication Systems","author":"Qureshi","year":"2024"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-88221-1","volume-title":"The Digital Playbook: A Practitioner\u2019s Guide To Smart, Connected Products and Solutions With AIoT","author":"Slama","year":"2023"},{"key":"ref16","first-page":"1","article-title":"Artificial Internet of Things (AIoT): A review","volume-title":"Proc. Int. Conf. Electr., Comput. Energy Technol. (ICECET","author":"Nourildean"},{"key":"ref17","volume-title":"PRISMA 2020 Statement","year":"2020"},{"key":"ref18","volume-title":"Publish or Perish","author":"Harzing","year":"2007"},{"issue":"1","key":"ref19","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3390\/fi11010003","article-title":"Security risk analysis of LoRaWAN and future directions","volume":"11","author":"Butun","year":"2018","journal-title":"Future Internet"},{"key":"ref20","first-page":"112","article-title":"LoRaWAN v1.1 security: Are we in the clear yet?","volume-title":"Proc. IEEE 6th Int. Conf. Dependability Sensor Cloud Big Data Syst. Application (DependSys)","author":"Philip"},{"key":"ref21","first-page":"458","article-title":"Analysis of IoT authentication over LoRa","volume-title":"Proc. 16th Int. Conf. Distrib. Comput. Sensor Syst. (DCOSS)","author":"Heeger"},{"key":"ref22","first-page":"353","article-title":"Man in the middle attack mitigation in LoRaWAN","volume-title":"Proc. Int. Conf. Inventive Comput. Technol. (ICICT)","author":"Thomas"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03064-8"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"54631","DOI":"10.1109\/ACCESS.2020.2978100","article-title":"Secure session key generation method for LoRaWAN servers","volume":"8","author":"Tsai","year":"2020","journal-title":"IEEE Access"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2020.100303","article-title":"LoRaWAN security survey: Issues, threats and possible mitigation techniques","volume":"12","author":"Noura","year":"2020","journal-title":"Internet Things"},{"key":"ref26","first-page":"387","article-title":"Review on authentication schemes for device security in LoRaWAN","volume-title":"Proc. 19th OITS Int. Conf. Inf. Technol. (OCIT)","author":"Naidu"},{"key":"ref27","first-page":"1","article-title":"A secure and efficient blockchain-based key management scheme for LoRaWAN","volume-title":"Proc. IEEE Wireless Commun. Netw. Conf. (WCNC)","author":"Tan"},{"key":"ref28","first-page":"0455","article-title":"Security threats and service degradation detection in LoRaWAN networks","volume-title":"Proc. Ural Symp. Biomed. Eng., Radioelectronics Inf. Technol. (USBEREIT)","author":"Yakin"},{"issue":"16","key":"ref29","doi-asserted-by":"crossref","first-page":"7642","DOI":"10.3390\/app11167642","article-title":"Testbed for LoRaWAN security: Design and validation through man-in-the-middle attacks study","volume":"11","author":"Pospisil","year":"2021","journal-title":"Appl. Sci."},{"issue":"1","key":"ref30","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/JSEN.2020.3013117","article-title":"Secure decentralised deployment of LoRaWAN sensors","volume":"21","author":"McPherson","year":"2021","journal-title":"IEEE Sensors J."},{"issue":"2","key":"ref31","doi-asserted-by":"crossref","first-page":"36","DOI":"10.3390\/jsan10020036","article-title":"Design, analysis, and experimental evaluation of a new secure rejoin mechanism for LoRaWAN using elliptic-curve cryptography","volume":"10","author":"Milani","year":"2021","journal-title":"J. Sensor Actuator Netw."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3412382.3458256"},{"key":"ref33","first-page":"1","article-title":"An attack analysis framework for LoRaWAN applied advanced manufacturing","volume-title":"Proc. IEEE Int. Symp. Technol. Homeland Secur. (HST)","author":"Monjur"},{"key":"ref34","first-page":"1","article-title":"Jamming of LoRa PHY and countermeasure","volume-title":"Proc. IEEE INFOCOM - IEEE Conf. Comput. Commun.","author":"Hou"},{"issue":"7","key":"ref35","doi-asserted-by":"crossref","first-page":"2384","DOI":"10.3390\/s21072384","article-title":"Secure LoRa firmware update with adaptive data rate techniques","volume":"21","author":"Heeger","year":"2021","journal-title":"Sensors"},{"key":"ref36","first-page":"1","article-title":"Exploiting physical layer vulnerabilities in LoRaWAN-based IoT networks","volume-title":"Proc. IEEE 8th World Forum Internet Things (WF-IoT)","author":"Torres"},{"key":"ref37","first-page":"1","article-title":"Device fingerprinting based multifactor authentication in LoRa device","volume-title":"Proc. IEEE 19th India Council Int. Conf. (INDICON)","author":"Singhal"},{"key":"ref38","first-page":"35","article-title":"Analysis of security vulnerabilities in LoRaWAN smart city","volume-title":"Proc. IEEE Symp. Wireless Technol. Appl. (ISWTA)","author":"Ilmani Binti Mohd Yusoff"},{"key":"ref39","first-page":"491","article-title":"RF fingerprinting of LoRa transmitters using machine learning with self-organizing maps for cyber intrusion detection","volume-title":"IEEE MTT-S Int. Microw. Symp. Dig.","author":"Nair"},{"key":"ref40","first-page":"193","article-title":"Machine learning models for LoRa wan IoT anomaly detection","volume-title":"Proc. Int. Conf. Adv. Comput. Sci. Inf. Syst. (ICACSIS)","author":"Kurniawan"},{"key":"ref41","first-page":"1","article-title":"LoRaWAN performance evaluation and resilience under jamming attacks","volume-title":"Proc. Sensor Signal Process. Defence Conf. (SSPD)","author":"Kalokidou"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2022.02.017","article-title":"Discovery privacy threats via device de-anonymization in LoRaWAN","volume":"189","author":"Spadaccino","year":"2022","journal-title":"Comput. Commun."},{"issue":"5","key":"ref43","doi-asserted-by":"crossref","first-page":"797","DOI":"10.3390\/electronics11050797","article-title":"A multiple end-devices authentication scheme for LoRaWAN","volume":"11","author":"Fan","year":"2022","journal-title":"Electronics"},{"key":"ref44","first-page":"2026","article-title":"LoRaLOFT\u2014A local outlier factor-based malicious nodes detection method on MAC layer for LoRaWAN","volume-title":"Proc. GLOBECOM","author":"Chen"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"96672","DOI":"10.1109\/ACCESS.2022.3204005","article-title":"Securing end-node to gateway communication in LoRaWAN with a lightweight security protocol","volume":"10","author":"Barriga","year":"2022","journal-title":"IEEE Access"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"18807","DOI":"10.1109\/ACCESS.2022.3150281","article-title":"A novel secure root key updating scheme for LoRaWANs based on CTR_AES DRBG 128","volume":"10","author":"Hayati","year":"2022","journal-title":"IEEE Access"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"101825","DOI":"10.1109\/ACCESS.2022.3208171","article-title":"Investigation on security risk of LoRaWAN: Compatibility scenarios","volume":"10","author":"Loukil","year":"2022","journal-title":"IEEE Access"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"58722","DOI":"10.1109\/ACCESS.2022.3179004","article-title":"A fault-tolerant and secure architecture for key management in LoRaWAN based on permissioned blockchain","volume":"10","author":"Ribeiro","year":"2022","journal-title":"IEEE Access"},{"issue":"3","key":"ref49","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/MNET.001.2100553","article-title":"Deep-learning-based device fingerprinting for increased LoRa-IoT security: Sensitivity to network deployment changes","volume":"36","author":"Hamdaoui","year":"2022","journal-title":"IEEE Netw."},{"issue":"4","key":"ref50","doi-asserted-by":"crossref","first-page":"5455","DOI":"10.1109\/JSYST.2022.3174157","article-title":"Implementation of a secure LoRaWAN system for industrial Internet of Things integrated with IPFS and blockchain","volume":"16","author":"Shahjalal","year":"2022","journal-title":"IEEE Syst. J."},{"issue":"1","key":"ref51","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/TII.2021.3075440","article-title":"A secure and LoRaWAN compatible user authentication protocol for critical applications in the IoT environment","volume":"18","author":"Jabbari","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"issue":"1","key":"ref52","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3390\/jsan11010005","article-title":"Blockchain-based security model for LoRaWAN firmware updates","volume":"11","author":"Mtetwa","year":"2022","journal-title":"J. Sensor Actuator Netw."},{"issue":"3","key":"ref53","doi-asserted-by":"crossref","first-page":"52","DOI":"10.3390\/jsan11030052","article-title":"A trusted security key management server in LoRaWAN: Modelling and analysis","volume":"11","author":"Ntshabele","year":"2022","journal-title":"J. Sensor Actuator Netw."},{"issue":"19","key":"ref54","doi-asserted-by":"crossref","first-page":"3421","DOI":"10.3390\/math10193421","article-title":"A comprehensive analysis of LoRaWAN key security models and possible attack solutions","volume":"10","author":"Ntshabele","year":"2022","journal-title":"Mathematics"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3543805"},{"issue":"9","key":"ref56","doi-asserted-by":"crossref","first-page":"3498","DOI":"10.3390\/s22093498","article-title":"Enhancing cyber security of LoRaWAN gateways under adversarial attacks","volume":"22","author":"Mohamed","year":"2022","journal-title":"Sensors"},{"issue":"9","key":"ref57","doi-asserted-by":"crossref","first-page":"3127","DOI":"10.3390\/s22093127","article-title":"LoRaWAN physical layer-based attacks and countermeasures, a review","volume":"22","author":"Ruotsalainen","year":"2022","journal-title":"Sensors"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4452"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09884-8"},{"key":"ref60","first-page":"1","article-title":"Evaluating LoRaWAN performance in intentional and unintentional DoS attacks by legacy 900 MHz network devices","volume-title":"Proc. 6th Int. Conf. Adv. Commun. Technol. Netw. (CommNet)","author":"Bang"},{"key":"ref61","first-page":"1","article-title":"Re-identifying of LoRa devices in an actual passive packet sniffer","volume-title":"Proc. IEEE 9th World Forum Internet Things (WF-IoT)","author":"Abdelghany"},{"key":"ref62","first-page":"95","article-title":"Obtaining security characteristics through simultaneous reception of LoRaWAN packets in redundant gateways","volume-title":"Proc. 20th Annu. IEEE Int. Conf. Sens., Commun., Netw. (SECON)","author":"Alfayoumi"},{"key":"ref63","first-page":"1","article-title":"An efficient and secure DAG-based LoRaWAN system","volume-title":"Proc. IEEE 32nd Int. Symp. Ind. Electron. (ISIE)","author":"Wei"},{"key":"ref64","first-page":"1","article-title":"Aggregation of contiguous packets in an actual LoRaWAN passive packet sniffer","volume-title":"Proc. IEEE 97th Veh. Technol. Conf. (VTC-Spring)","author":"Abdelghany"},{"key":"ref65","first-page":"1","article-title":"LoRa-PUF: A two-step security solution for LoRaWAN","volume-title":"Proc. IEEE 97th Veh. Technol. Conf. (VTC-Spring)","author":"Aliyu"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3561973"},{"issue":"11","key":"ref67","doi-asserted-by":"crossref","first-page":"2503","DOI":"10.3390\/electronics12112503","article-title":"Analysis of cyber security aspects of data transmission in large-scale networks based on the LoRaWAN protocol intended for monitoring critical infrastructure sensors","volume":"12","author":"Czeczot","year":"2023","journal-title":"Electronics"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.future.2022.08.007","article-title":"Privacy leakage of LoRaWAN smart parking occupancy sensors","volume":"138","author":"Rodi\u0107","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref69","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.future.2023.01.021","article-title":"Radio fingerprinting for anomaly detection using federated learning in LoRa-enabled industrial Internet of Things","volume":"143","author":"Halder","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref70","first-page":"4737","article-title":"Robustness and resilience of LoRaWAN facing greedy behaviors on the MAC layer","volume-title":"Proc. ICC","author":"Chen"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"68301","DOI":"10.1109\/ACCESS.2023.3291420","article-title":"Mitigating cyber attacks in LoRaWAN via lightweight secure key management scheme","volume":"11","author":"Qadir","year":"2023","journal-title":"IEEE Access"},{"issue":"11","key":"ref72","doi-asserted-by":"crossref","first-page":"3123","DOI":"10.1109\/LCOMM.2023.3322119","article-title":"Novel denial-of-service attacks against LoRaWAN on MAC layer","volume":"27","author":"Chen","year":"2023","journal-title":"IEEE Commun. Lett."},{"issue":"24","key":"ref73","doi-asserted-by":"crossref","first-page":"22143","DOI":"10.1109\/JIOT.2023.3304175","article-title":"A secure and efficient protocol for LoRa using cryptographic hardware accelerators","volume":"10","author":"Puckett","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref74","doi-asserted-by":"crossref","first-page":"4593","DOI":"10.1109\/TIFS.2023.3295615","article-title":"Polarization fingerprint-based LoRaWAN physical layer authentication","volume":"18","author":"Xu","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref75","first-page":"385","article-title":"Adversarial attacks on LoRa device identification and rogue signal detection with deep learning","volume-title":"Proc. IEEE Mil. Commun. Conf. (MILCOM)","author":"Sagduyu"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-10095-4"},{"key":"ref77","first-page":"1","article-title":"Detecting, demodulating & decoding LoRa","volume-title":"Proc. 15th Int. Conf. Comput. Commun. Netw. Technol. (ICCCNT)","author":"Reddy"},{"key":"ref78","first-page":"1","article-title":"Taxonomy of user-centric errors leading to cyber attacks in LoRaWAN","volume-title":"Proc. 17th Int. Conf. Secur. Inf. Netw. (SIN)","author":"Parajuli"},{"key":"ref79","first-page":"532","article-title":"Temporal analysis of LoRaWAN data packets: Unveiling patterns for improving secure-oriented IoT designs","volume-title":"Proc. 20th Int. Conf. Distrib. Comput. Smart Syst. Internet Things (DCOSS-IoT)","author":"Guill\u00e9n"},{"key":"ref80","first-page":"1","article-title":"Potential counteractions to duty cycle-compliant jamming in LoRa networks","volume-title":"Proc. 32nd Telecommun. Forum (TELFOR)","author":"Delgado Brito"},{"key":"ref81","first-page":"804","article-title":"Enhancement in LoRaWAN\u2019s security with post-quantum key encapsulation method","volume-title":"Proc. IEEE 10th World Forum Internet Things (WF-IoT)","author":"Figlarz"},{"key":"ref82","first-page":"1","article-title":"Security analysis and evaluation of denial of service attack in LoRaWan-driven automation","volume-title":"Proc. IEEE 22nd Int. Conf. Ind. Informat. (INDIN)","author":"Zhou"},{"key":"ref83","first-page":"1","article-title":"Low complexity deep learning models for LoRa radio frequency fingerprinting","volume-title":"Proc. IEEE 35th Int. Symp. Pers., Indoor Mobile Radio Commun. (PIMRC)","author":"Ahmed"},{"key":"ref84","first-page":"535","article-title":"A security verification framework for the LoRaWAN protocol with application in the manufacturing industry","volume-title":"Proc. IEEE 35th Int. Symp. Softw. Rel. Eng. (ISSRE)","author":"Dong"},{"key":"ref85","first-page":"1","article-title":"Security enhancement of OTAA based joining procedure in LoRaWAN for satellite communication","volume-title":"Proc. IEEE 99th Veh. Technol. Conf. (VTC-Spring)","author":"Dave"},{"key":"ref86","first-page":"1","article-title":"LoRaWAN security framework to mitigate DoS attacks at the gateway level using machine learning","volume-title":"Proc. IEEE Pune Sect. Int. Conf. (PuneCon)","author":"Nixon"},{"key":"ref87","first-page":"146","article-title":"Handling jamming attacks in a LoRa network","volume-title":"Proc. IEEE\/ACM 9th Int. Conf. Internet-of-Things Design Implement. (IoTDI)","author":"Haque"},{"key":"ref88","first-page":"35","article-title":"Chirp detection and signal transmission: A HackRF reactive attack","volume-title":"Proc. Int. Conf. Smart Syst. Technol. (SST)","author":"\u0160abi\u0107"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"2589","DOI":"10.1109\/ACCESS.2023.3348416","article-title":"Enhancing LoRaWAN security: An advanced AES-based cryptographic approach","volume":"12","author":"Abboud","year":"2024","journal-title":"IEEE Access"},{"issue":"17","key":"ref90","doi-asserted-by":"crossref","first-page":"28222","DOI":"10.1109\/JSEN.2024.3431432","article-title":"A lightweight authentication scheme for LoRaWAN nodes represented as on-chain nonfungible tokens","volume":"24","author":"Sidorov","year":"2024","journal-title":"IEEE Sensors J."},{"key":"ref91","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1109\/TMLCN.2024.3417806","article-title":"Physical layer spoof detection and authentication for IoT devices using deep learning methods","volume":"2","author":"Huang","year":"2024","journal-title":"IEEE Trans. Mach. Learn. Commun. Netw."},{"issue":"4","key":"ref92","doi-asserted-by":"crossref","first-page":"871","DOI":"10.3390\/iot5040040","article-title":"Long-range wide area network intrusion detection at the edge","volume":"5","author":"Esteves","year":"2024","journal-title":"IoT"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.5220\/0012703400003705"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-024-02707-6"},{"issue":"2","key":"ref95","doi-asserted-by":"crossref","first-page":"68","DOI":"10.3390\/fi17020068","article-title":"Machine learning and deep learning-based multi-attribute physical-layer authentication for spoofing detection in LoRaWAN","volume":"17","author":"Pourghasem","year":"2025","journal-title":"Future Internet"},{"issue":"12","key":"ref96","doi-asserted-by":"crossref","first-page":"20261","DOI":"10.1109\/JIOT.2025.3547645","article-title":"Adversarial attack and defense for LoRa device identification and authentication via deep learning","volume":"12","author":"Sagduyu","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"ref97","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/JRFID.2024.3523234","article-title":"Authentication by intelligent learning: A novel hybrid deep learning\/Machine-learning radio frequency fingerprinting scheme","volume":"9","author":"Al-Qabbani","year":"2025","journal-title":"IEEE J. Radio Freq. Identificat."},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06802-6"},{"issue":"2","key":"ref99","doi-asserted-by":"crossref","first-page":"2141","DOI":"10.1109\/JSEN.2024.3504259","article-title":"Classification and characterization of LoRaWAN energy depletion attacks: A review","volume":"25","author":"Proto","year":"2025","journal-title":"IEEE Sensors J."},{"key":"ref100","doi-asserted-by":"crossref","first-page":"142893","DOI":"10.1109\/ACCESS.2021.3121606","article-title":"LoRa device fingerprinting in the wild: Disclosing RF data-driven fingerprint sensitivity to deployment variability","volume":"9","author":"Elmaghbub","year":"2021","journal-title":"IEEE Access"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/3419016.3431491"},{"key":"ref102","volume-title":"Our Quantum Echoes Algorithm is a Big Step Toward Real-World Applications for Quantum Computing","author":"Hartmut","year":"2025"},{"key":"ref103","article-title":"Status report on the third round of the NIST post-quantum cryptography standardization process","author":"Alagic","year":"2022"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1109\/TIFS.2022.3152404","article-title":"Towards scalable and channel-robust radio frequency fingerprint identification for LoRa","volume":"17","author":"Shen","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Security"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11363065\/11251009.pdf?arnumber=11251009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T06:02:46Z","timestamp":1769493766000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11251009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,1]]},"references-count":104,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3633940","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,1]]}}}