{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T22:54:12Z","timestamp":1773183252997,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T00:00:00Z","timestamp":1529884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"SMART Project, EU Regional Fund","award":["20201010"],"award-info":[{"award-number":["20201010"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,25]]},"DOI":"10.1145\/3213299.3213304","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T15:35:48Z","timestamp":1527780948000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":71,"title":["Analysis of LoRaWAN v1.1 security"],"prefix":"10.1145","author":[{"given":"Ismail","family":"Butun","sequence":"first","affiliation":[{"name":"Mid Sweden University, Sundvall, Sweden"}]},{"given":"Nuno","family":"Pereira","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of Porto, Porto, Portugal"}]},{"given":"Mikael","family":"Gidlund","sequence":"additional","affiliation":[{"name":"Mid Sweden University, Sundvall, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2018,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600613"},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/lora-alliance.org\/lorawan-for-developers. (22","author":"Alliance Lora","year":"2017","unstructured":"Lora Alliance . 2017. LoRa WAN 1.1 Specification , Oct. 2017. http:\/\/lora-alliance.org\/lorawan-for-developers. (22 Oct. 2017 ). Lora Alliance. 2017. LoRaWAN 1.1 Specification, Oct. 2017. http:\/\/lora-alliance.org\/lorawan-for-developers. (22 Oct. 2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"S. Antipolis and P. Girard. 2015. Low Power Wide Area Networks security. white paper by Gemalto Inc. (2015).  S. Antipolis and P. Girard. 2015. Low Power Wide Area Networks security. white paper by Gemalto Inc. (2015)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2017.7985777"},{"key":"e_1_3_2_1_5_1","volume-title":"Notes on LoRaWAN security - Medium. https:\/\/medium.com\/@brocaar\/notes-on-lorawan-security-7e741a8ee4fa. (28","author":"Brocaar O.","year":"2017","unstructured":"O. Brocaar . 2017. Notes on LoRaWAN security - Medium. https:\/\/medium.com\/@brocaar\/notes-on-lorawan-security-7e741a8ee4fa. (28 Nov. 2017 ). O. Brocaar. 2017. Notes on LoRaWAN security - Medium. https:\/\/medium.com\/@brocaar\/notes-on-lorawan-security-7e741a8ee4fa. (28 Nov. 2017)."},{"key":"e_1_3_2_1_6_1","unstructured":"Casimier Joseph Franciscus Cremers. 2006. Scyther: Semantics and verification of security protocols. Ph.D. thesis Eindhoven University of Technology Netherlands.  Casimier Joseph Franciscus Cremers. 2006. Scyther: Semantics and verification of security protocols. Ph.D. thesis Eindhoven University of Technology Netherlands."},{"key":"e_1_3_2_1_7_1","volume-title":"Computer and Energy Science (SpliTech), 2017 2nd International Multidisciplinary Conference on. IEEE, 1--6.","author":"Carvalho Silva Jonathan De","year":"2017","unstructured":"Jonathan De Carvalho Silva , Joel JPC Rodrigues , Antonio M Alberti , Petar Solic , and Andre LL Aquino . 2017 . LoRaWAN-A low power WAN protocol for Internet of Things: A review and opportunities . In Computer and Energy Science (SpliTech), 2017 2nd International Multidisciplinary Conference on. IEEE, 1--6. Jonathan De Carvalho Silva, Joel JPC Rodrigues, Antonio M Alberti, Petar Solic, and Andre LL Aquino. 2017. LoRaWAN-A low power WAN protocol for Internet of Things: A review and opportunities. In Computer and Energy Science (SpliTech), 2017 2nd International Multidisciplinary Conference on. IEEE, 1--6."},{"key":"e_1_3_2_1_8_1","volume-title":"The New Gumstix Conduit Dev Boards. https:\/\/gumstix.com\/lorawan-family\/. (23","year":"2018","unstructured":"Gumstix. 2018. The New Gumstix Conduit Dev Boards. https:\/\/gumstix.com\/lorawan-family\/. (23 Jan. 2018 ). Gumstix. 2018. The New Gumstix Conduit Dev Boards. https:\/\/gumstix.com\/lorawan-family\/. (23 Jan. 2018)."},{"key":"e_1_3_2_1_9_1","volume-title":"http:\/\/ingenu.com\/technology\/rpma\/. (25","author":"Ingenu. 2018. Ingenu Inc.","year":"2018","unstructured":"Ingenu. 2018. Ingenu Inc. http:\/\/ingenu.com\/technology\/rpma\/. (25 Jan. 2018 ). Ingenu. 2018. Ingenu Inc. http:\/\/ingenu.com\/technology\/rpma\/. (25 Jan. 2018)."},{"key":"e_1_3_2_1_10_1","volume-title":"A Dual Key-Based Activation Scheme for Secure LoRaWAN. Wireless Communications and Mobile Computing 2017","author":"Kim Jaehyu","year":"2017","unstructured":"Jaehyu Kim and JooSeok Song . 2017. A Dual Key-Based Activation Scheme for Secure LoRaWAN. Wireless Communications and Mobile Computing 2017 ( 2017 ). Jaehyu Kim and JooSeok Song. 2017. A Dual Key-Based Activation Scheme for Secure LoRaWAN. Wireless Communications and Mobile Computing 2017 (2017)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868374"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126973.3126980"},{"key":"e_1_3_2_1_13_1","volume-title":"Lora security: Building a secure lora solution. MWR Labs Whitepaper","author":"Miller Robert","year":"2016","unstructured":"Robert Miller . 2016. Lora security: Building a secure lora solution. MWR Labs Whitepaper ( 2016 ). Robert Miller. 2016. Lora security: Building a secure lora solution. MWR Labs Whitepaper (2016)."},{"key":"e_1_3_2_1_14_1","volume-title":"Information Networking (ICOIN), 2017 International Conference on. IEEE, 718--720","author":"Na SeungJae","year":"2017","unstructured":"SeungJae Na , DongYeop Hwang , WoonSeob Shin , and Ki-Hyung Kim . 2017 . Scenario and countermeasure for replay attack using join request messages in LoRaWAN . In Information Networking (ICOIN), 2017 International Conference on. IEEE, 718--720 . SeungJae Na, DongYeop Hwang, WoonSeob Shin, and Ki-Hyung Kim. 2017. Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In Information Networking (ICOIN), 2017 International Conference on. IEEE, 718--720."},{"key":"e_1_3_2_1_15_1","volume-title":"Int. Conf. on. IEEE, 1--7.","author":"Naoui Sarra","year":"2016","unstructured":"Sarra Naoui , Mohamed Elhoucine Elhdhili , and Leila Azouz Saidane . 2016 . Enhancing the security of the IoT Lora WAN architecture. In Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN) , Int. Conf. on. IEEE, 1--7. Sarra Naoui, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. 2016. Enhancing the security of the IoT Lora WAN architecture. In Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), Int. Conf. on. IEEE, 1--7."},{"key":"e_1_3_2_1_16_1","unstructured":"Nwave. 2018. Nwave Technologies Inc. http:\/\/nwave.io. (25 Jan. 2018).  Nwave. 2018. Nwave Technologies Inc. http:\/\/nwave.io. (25 Jan. 2018)."},{"key":"e_1_3_2_1_17_1","volume-title":"http:\/\/qowisio.com. (25","author":"Qowisio. 2018. Qowisio Inc.","year":"2018","unstructured":"Qowisio. 2018. Qowisio Inc. http:\/\/qowisio.com. (25 Jan. 2018 ). Qowisio. 2018. Qowisio Inc. http:\/\/qowisio.com. (25 Jan. 2018)."},{"key":"e_1_3_2_1_18_1","volume-title":"Low Power Wide Area Network Market Worth. https:\/\/www.bizjournals.com\/prnewswire\/press_releases. (22","author":"Rohan M.","year":"2018","unstructured":"M. Rohan . 2018. Low Power Wide Area Network Market Worth. https:\/\/www.bizjournals.com\/prnewswire\/press_releases. (22 Jan. 2018 ). M. Rohan. 2018. Low Power Wide Area Network Market Worth. https:\/\/www.bizjournals.com\/prnewswire\/press_releases. (22 Jan. 2018)."},{"key":"e_1_3_2_1_19_1","volume-title":"http:\/\/semtech.com\/. (23","author":"Semtech. 2018. Semtech Inc.","year":"2018","unstructured":"Semtech. 2018. Semtech Inc. http:\/\/semtech.com\/. (23 Jan. 2018 ). Semtech. 2018. Semtech Inc. http:\/\/semtech.com\/. (23 Jan. 2018)."},{"key":"e_1_3_2_1_20_1","volume-title":"What is LoRa? http:\/\/www.semtech.com\/wireless-rf\/internet-of-things\/what-is-lora\/. (22","year":"2018","unstructured":"Semtech. 2018. What is LoRa? http:\/\/www.semtech.com\/wireless-rf\/internet-of-things\/what-is-lora\/. (22 Jan. 2018 ). Semtech. 2018. What is LoRa? http:\/\/www.semtech.com\/wireless-rf\/internet-of-things\/what-is-lora\/. (22 Jan. 2018)."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/sigfox.com. (23","author":"Sigfox. 2018. Sigfox Inc.","year":"2018","unstructured":"Sigfox. 2018. Sigfox Inc. https:\/\/sigfox.com. (23 Jan. 2018 ). Sigfox. 2018. Sigfox Inc. https:\/\/sigfox.com. (23 Jan. 2018)."},{"key":"e_1_3_2_1_22_1","volume-title":"https:\/\/telensa.com\/unb-wireless\/. (25","author":"Telensa. 2018. Telensa Inc.","year":"2018","unstructured":"Telensa. 2018. Telensa Inc. https:\/\/telensa.com\/unb-wireless\/. (25 Jan. 2018 ). Telensa. 2018. Telensa Inc. https:\/\/telensa.com\/unb-wireless\/. (25 Jan. 2018)."},{"key":"e_1_3_2_1_23_1","unstructured":"Things. 2018. The Things Network. http:\/\/thethingsnetwork.org\/. (23 Jan. 2018).  Things. 2018. The Things Network. http:\/\/thethingsnetwork.org\/. (23 Jan. 2018)."},{"key":"e_1_3_2_1_24_1","volume-title":"Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks. In Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, 1--6.","author":"Tomasin Stefano","year":"2017","unstructured":"Stefano Tomasin , Simone Zulian , and Lorenzo Vangelista . 2017 . Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks. In Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, 1--6. Stefano Tomasin, Simone Zulian, and Lorenzo Vangelista. 2017. Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks. In Wireless Communications and Networking Conference Workshops (WCNCW). IEEE, 1--6."},{"key":"e_1_3_2_1_25_1","volume-title":"Future Access Enablers of Ubiquitous and Intelligent Infrastructures","author":"Vangelista Lorenzo","unstructured":"Lorenzo Vangelista , Andrea Zanella , and Michele Zorzi . 2015. Long-range IoT technologies: The dawn of LoRaTM . In Future Access Enablers of Ubiquitous and Intelligent Infrastructures . Springer , 51--58. Lorenzo Vangelista, Andrea Zanella, and Michele Zorzi. 2015. Long-range IoT technologies: The dawn of LoRaTM. In Future Access Enablers of Ubiquitous and Intelligent Infrastructures. Springer, 51--58."},{"key":"e_1_3_2_1_26_1","volume-title":"http:\/\/waviot.com\/. (25","author":"Waviot. 2018. Waviot Inc.","year":"2018","unstructured":"Waviot. 2018. Waviot Inc. http:\/\/waviot.com\/. (25 Jan. 2018 ). Waviot. 2018. Waviot Inc. http:\/\/waviot.com\/. (25 Jan. 2018)."},{"key":"e_1_3_2_1_27_1","volume-title":"http:\/\/weightless.org\/. (24","author":"Weightless","year":"2018","unstructured":"Weightless. 2018. Weightless SIG. http:\/\/weightless.org\/. (24 Jan. 2018 ). Weightless. 2018. Weightless SIG. http:\/\/weightless.org\/. (24 Jan. 2018)."},{"key":"e_1_3_2_1_28_1","unstructured":"Xueying Yang. 2017. LoRaWAN: Vulnerability Analysis and Practical Exploitation. (2017).  Xueying Yang. 2017. LoRaWAN: Vulnerability Analysis and Practical Exploitation. (2017)."}],"event":{"name":"Mobihoc '18: The Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","location":"Los Angeles California","acronym":"Mobihoc '18","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3213299.3213304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3213299.3213304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:12Z","timestamp":1750212492000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3213299.3213304"}},"subtitle":["research paper"],"short-title":[],"issued":{"date-parts":[[2018,6,25]]},"references-count":28,"alternative-id":["10.1145\/3213299.3213304","10.1145\/3213299"],"URL":"https:\/\/doi.org\/10.1145\/3213299.3213304","relation":{},"subject":[],"published":{"date-parts":[[2018,6,25]]},"assertion":[{"value":"2018-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}