{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T05:09:23Z","timestamp":1773810563544,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,13]]},"DOI":"10.1145\/3696593.3696631","type":"proceedings-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T10:35:52Z","timestamp":1753958152000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Secure LoRaWan Architecture and Infrastructure Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7471-4928","authenticated-orcid":false,"given":"Joel D","family":"Guerreiro","sequence":"first","affiliation":[{"name":"Universidade do Algarve, Instituto Superior de Engenharia, Faro, PT"}]}],"member":"320","published-online":{"date-parts":[[2025,7,31]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Samira Abboud and Nabil Abdoun. 2024. Enhancing LoRaWAN Security: An Advanced AES-Based Cryptographic Approach. IEEE Access 12 (2024) 2589\u20132606. 10.1109\/access.2023.3348416","DOI":"10.1109\/access.2023.3348416"},{"key":"e_1_3_3_1_3_2","unstructured":"LoRa Alliance. 2017. LoRaWAN Security Full End-to-End Encryption for IoT Application Providers White Paper."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/icwt58823.2023.10335431"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/cafe58535.2023.10291369"},{"key":"e_1_3_3_1_6_2","unstructured":"Philippe Bogaerts. 2017. ARP Spoofing Docker Containers."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/icc45041.2023.10278996"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/globecom54140.2023.10436733"},{"key":"e_1_3_3_1_9_2","unstructured":"LoRa Alliance\u00a0Technical Committee. 2020. Lorawan l2 1.0. 4 specification (ts001-1.0. 4). Online. https:\/\/resources.lora-alliance.org\/technical-specifications\/ts001-1-0-4-lorawan-l2-1-0-4-specification"},{"key":"e_1_3_3_1_10_2","unstructured":"LoRa Alliance\u00a0Technical Committee. 2021. RP002-1.0.3 LoRaWAN Regional Parameters. https:\/\/lora-alliance.org\/wp-content\/uploads\/2021\/05\/RP002-1.0.3-FINAL-1.pdf"},{"key":"e_1_3_3_1_11_2","unstructured":"LoRa Alliance\u00a0Technical Committee. 2022. Lora Alliance lorawan and 5g infographic. (2022). https:\/\/resources.lora-alliance.org\/infographic"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/isriti48646.2019.9034571"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49108-6_39"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Yacoub Hanna Mumin Cebe Juan Leon and Kemal Akkaya. 2024. Efficient Group Key Management for Resilient Operation of LoRaWAN-Based Smart Grid Applications. IEEE Transactions on Control Systems Technology (2024) 1\u201312. 10.1109\/tcst.2024.3378988","DOI":"10.1109\/tcst.2024.3378988"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ficloud.2017.47"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488774"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/iswta55313.2022.9942752"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ies53407.2021.9593948"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/vitecon58111.2023.10157165"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/pacet60398.2024.10497014"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/daas.2018.8396074"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/isscs.2017.8034915"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Luz\u00a0E. Marquez Alfonso Osorio Maria Calle Juan\u00a0C. Velez Antonio Serrano and John\u00a0E. Candelo-Becerra. 2020. On the Use of LoRaWAN in Smart Cities: A Study With Blocking Interference. IEEE Internet of Things Journal 7 4 (April 2020) 2806\u20132815. 10.1109\/jiot.2019.2962976","DOI":"10.1109\/jiot.2019.2962976"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","unstructured":"A. Martin S. Raponi T. Combe and R. Di\u00a0Pietro. 2018. Docker ecosystem \u2013 Vulnerability Analysis. Computer Communications 122 (June 2018) 30\u201343. 10.1016\/j.comcom.2018.03.011","DOI":"10.1016\/j.comcom.2018.03.011"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/icccnt56998.2023.10307493"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/iccsai59793.2023.10421124"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/icetsis61505.2024.10459411"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/cscn.2019.8931397"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC43012.2020.9128370"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","unstructured":"Olivier Seller. 2021. LoRaWAN Security. Journal of ICT Standardization (April 2021). 10.13052\/jicts2245-800x.915","DOI":"10.13052\/jicts2245-800x.915"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc51664.2024.10454863"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","unstructured":"Sari Sultan Imtiaz Ahmad and Tassos Dimitriou. 2019. Container Security: Issues Challenges and the Road Ahead. IEEE Access 7 (2019) 52976\u201352996. 10.1109\/access.2019.2911732","DOI":"10.1109\/access.2019.2911732"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485865"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","unstructured":"Chin\u2010Wei Tien Tse\u2010Yung Huang Chia\u2010Wei Tien Ting\u2010Chun Huang and Sy\u2010Yen Kuo. 2019. KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches. Engineering Reports 1 5 (Dec. 2019). 10.1002\/eng2.12080","DOI":"10.1002\/eng2.12080"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/giots.2018.8534557"},{"key":"e_1_3_3_1_36_2","unstructured":"Nikolaos Tsavalos and Ahmad\u00a0Abu Hashem. 2018. Low Power Wide Area Network (LPWAN) Technologies for Industrial IoT Applications. (2018)."},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/indin51400.2023.10218036"}],"event":{"name":"DSAI 2024: 11th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusion","location":"Abu Dhabi United Arab Emirates","acronym":"DSAI 2024"},"container-title":["Proceedings of the 11th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696593.3696631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T04:29:08Z","timestamp":1754540948000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696593.3696631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,13]]},"references-count":36,"alternative-id":["10.1145\/3696593.3696631","10.1145\/3696593"],"URL":"https:\/\/doi.org\/10.1145\/3696593.3696631","relation":{},"subject":[],"published":{"date-parts":[[2024,11,13]]},"assertion":[{"value":"2025-07-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}