LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution

dc.authoridDalveren, Yaser/0000-0002-9459-0042
dc.authoridAmro, Ahmed/0000-0002-3390-0772
dc.authoridAlaya Cheikh, Faouzi/0000-0002-4823-5250
dc.authorscopusid57216251825
dc.authorscopusid57215663164
dc.authorscopusid51763497600
dc.authorscopusid42461035200
dc.authorscopusid35408917600
dc.contributor.authorDalveren, Yaser
dc.contributor.authorAmro, Ahmed
dc.contributor.authorDalveren, Yaser
dc.contributor.authorCheikh, Faouzi Alaya
dc.contributor.authorDerawi, Mohammad
dc.contributor.otherDepartment of Electrical & Electronics Engineering
dc.date.accessioned2024-07-05T15:26:41Z
dc.date.available2024-07-05T15:26:41Z
dc.date.issued2023
dc.departmentAtılım Universityen_US
dc.department-temp[Bouzidi, Mohammed; Derawi, Mohammad] Norwegian Univ Sci & Technol, Dept Elect Syst, N-2821 Gjovik, Norway; [Amro, Ahmed] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, N-2821 Gjovik, Norway; [Dalveren, Yaser] Atilim Univ, Dept Elect & Elect Engn, TR-06830 Ankara, Turkiye; [Cheikh, Faouzi Alaya] Norwegian Univ Sci & Technol, Dept Comp Sci, N-2821 Gjovik, Norwayen_US
dc.descriptionDalveren, Yaser/0000-0002-9459-0042; Amro, Ahmed/0000-0002-3390-0772; Alaya Cheikh, Faouzi/0000-0002-4823-5250en_US
dc.description.abstractLow-power wide area network (LPWAN) technologies such as IQRF are becoming increasingly popular for a variety of Internet of Things (IoT) applications, including smart cities, industrial control, and home automation. However, LPWANs are vulnerable to cyber attacks that can disrupt the normal operation of the network or compromise sensitive information. Therefore, analyzing cybersecurity risks before deploying an LPWAN is essential, as it helps identify potential vulnerabilities and threats as well as allowing for proactive measures to be taken to secure the network and protect against potential attacks. In this paper, a security risk analysis of IQRF technology is conducted utilizing the failure mode effects analysis (FMEA) method. The results of this study indicate that the highest risk corresponds to four failure modes, namely compromised end nodes, a compromised coordinator, a compromised gateway and a compromised communication between nodes. Moreover, through this methodology, a qualitative risk evaluation is performed to identify potential security threats in the IQRF network and propose countermeasures to mitigate the risk of cyber attacks on IQRF networks.en_US
dc.identifier.citation1
dc.identifier.doi10.3390/s23042078
dc.identifier.issn1424-8220
dc.identifier.issue4en_US
dc.identifier.pmid36850676
dc.identifier.scopus2-s2.0-85148969251
dc.identifier.urihttps://doi.org/10.3390/s23042078
dc.identifier.urihttps://hdl.handle.net/20.500.14411/2585
dc.identifier.volume23en_US
dc.identifier.wosWOS:000941794700001
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherMdpien_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectLPWANen_US
dc.subjectInternet of Things (IoT)en_US
dc.subjectIQRFen_US
dc.subjectFMEAen_US
dc.subjectsecurityen_US
dc.titleLPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solutionen_US
dc.typeArticleen_US
dspace.entity.typePublication
relation.isAuthorOfPublication55e082ac-14c0-46a6-b8fa-50c5e40b59c8
relation.isAuthorOfPublication.latestForDiscovery55e082ac-14c0-46a6-b8fa-50c5e40b59c8
relation.isOrgUnitOfPublicationc3c9b34a-b165-4cd6-8959-dc25e91e206b
relation.isOrgUnitOfPublication.latestForDiscoveryc3c9b34a-b165-4cd6-8959-dc25e91e206b

Files

Collections