Implications of Cybersecurity Breaches in LPWANs

Implications of Cybersecurity Breaches in LPWANs

Åke Axeland, Henrik Hagfeldt, Magnus Carlsson, Lina Lagerquist Sergel, Ismail Butun
ISBN13: 9781799874683|ISBN10: 1799874680|ISBN13 Softcover: 9781799874690|EISBN13: 9781799874706
DOI: 10.4018/978-1-7998-7468-3.ch001
Cite Chapter Cite Chapter

MLA

Axeland, Åke, et al. "Implications of Cybersecurity Breaches in LPWANs." Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities, edited by Ismail Butun, IGI Global, 2021, pp. 1-18. https://doi.org/10.4018/978-1-7998-7468-3.ch001

APA

Axeland, Å., Hagfeldt, H., Carlsson, M., Lagerquist Sergel, L., & Butun, I. (2021). Implications of Cybersecurity Breaches in LPWANs. In I. Butun (Ed.), Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities (pp. 1-18). IGI Global. https://doi.org/10.4018/978-1-7998-7468-3.ch001

Chicago

Axeland, Åke, et al. "Implications of Cybersecurity Breaches in LPWANs." In Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities, edited by Ismail Butun, 1-18. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-7468-3.ch001

Export Reference

Mendeley
Favorite

Abstract

With the contrast of limited performance and big responsibility of IoT devices, potential security breaches can have serious impacts in means of safety and privacy. Potential consequences of attacks on IoT devices could be leakage of individuals daily habits and political decisions being influenced. While the consequences might not be avoidable in their entirety, adequate knowledge is a fundamental part of realizing the importance of IoT security and during the assessment of damages following a breach. This chapter will focus on two low-powered wide area network (LPWAN) technologies, narrow-band iot (NB-IoT) and long-range wide area network (LoRaWAN). Further, three use cases will be considered—healthcare, smart cities, and industry—which all to some degree rely on IoT devices. It is shown that with enough knowledge of possible attacks and their corresponding implications, more secure IoT systems can be developed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.