Security review of LoRaWAN networks

9b368ee76aa2b65a870563d4829a4d5e?s=47 Renaud Lifchitz
September 22, 2016

Security review of LoRaWAN networks

- Introduction to LoRaWAN networks & protocol
- Protocol attacks
- Implementation weaknesses
- Hardware attacks on node devices

9b368ee76aa2b65a870563d4829a4d5e?s=128

Renaud Lifchitz

September 22, 2016
Tweet