Key management with a trusted third party using LoRaWAN protocol : A study case for E2E security

Nowadays, Internet of Things (IoT) applications are gaining more importance in people’s everyday life. Depending of their usage (for long or short distance communications, using low or high power devices, etc.), several standards exist. In this study, the focus is on Low Power Wide Area Networks (L...

Full description

Bibliographic Details
Main Author: Ralambotiana, Miora
Format: Others
Language:English
Published: KTH, Skolan för elektroteknik och datavetenskap (EECS) 2018
Subjects:
IoT
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230671