Abstract
Low-power wide-area networks became truly popular just recently and nowadays is a subject of active research. Network coverage and cost efficiency unlock hidden power and technology capabilities. Nevertheless, there are still many concerns raised. Reliability and quality of service that can be delivered are hard to control. CIA Triade in connection to IoT networks have complications and adopting face challenges. Processing large batches of data over LPWAN complex and has bandwidth limitations on both physical and regulation layers. In this paper, we adopt an algorithm controlling the quality of service for huge batches of data transmission (based on media file examples) over LPWAN networks. We propose an approach that enables institutionalization based on Semtech LoRa controllers with well defined-predictable outputs of the system. Research various configurations and discover possible capacity limits. Proposed algorithms and practices allow the system to self-configure and optimize the amount of traffic sent over the network based on the application needs, which eventually provide the desired level of control over data integrity and availability within given technology boundaries.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
T. Lourensen. https://community.arm.com/iot/b/internet-of-things/posts/endpoint-ai-the-road-to-a-trillion-intelligent-endpoints
Aras, E., Ramachandran, G.S., Lawrence, P., Hughes, D.: Exploring the security vulnerabilities of LoRa. In: 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), pp. 1–6. IEEE (2017). https://doi.org/10.1109/CYBConf.2017.7985777
Xu, W., Jha, S., Hu, W.: LoRa-key: secure key generation system for lora-based network. IEEE Internet Things J. 6(4), 6404–6416 (2019). https://doi.org/10.1109/JIOT.2018.2888553
Xing, J., Hou, L., Zhang, K., Zheng, K.: An improved secure key management scheme for LoRa system. In: 2019 IEEE 19th International Conference on Communication Technology (ICCT), pp. 296–301. IEEE (2019). https://doi.org/10.1109/ICCT46805.2019.8947215
Manoharan, A.M., Rathinasabapathy, V.: Secured communication for remote biomedical monitoring system using LoRa. Sens. Lett. 17(11), 888–897 (2019). https://doi.org/10.1166/sl.2019.4146
Wiklundh, K.C.: Understanding the IoT technology LoRa and its interference vulnerability. In: 2019 International Symposium on Electromagnetic Compatibility - EMC Europe, pp. 533–538. IEEE (2019).https://doi.org/10.1109/EMCEurope.2019.887196
Brazhenenko, M., Shevchenko, V., Bychkov, O., Jekov, B., Petrova, P., Kovatcheva, E.: Adopting machine learning for images transferred with LoRaWAN. Inf. Secur. Int. J. 47(2), 172–186 (2020). https://doi.org/10.11610/isij.4712
HД TЗI 2.5–004–99. Кpитepiї oцiнки зaxищeнocтi iнфopмaцiї в кoмп’ютepниx cиcтeмax вiд нecaнкцioнoвaнoгo дocтyпy. Зaтвepджeнo нaк. Дeпapтaмeнтy cпeцiaльниx тeлeкoмyнiкaцiйниx cиcтeм тa зaxиcтy iнфopмaцiї CБ Укpaїни вiд “ 28 ” квiтня 1999 p. № 22 iз змiнaми
HД TЗI 2.5–005 -99. Клacифiкaцiя aвтoмaтизoвaниx cиcтeм i cтaндapтнi фyнкцioнaльнi пpoфiлi зaxищeнocтi oбpoблювaнoї iнфopмaцiї вiд нecaнкцioнoвaнoгo дocтyпy. Зaтвepджeнo нaк. Дeпapтaмeнтy cпeцiaльниx тeлeкoмyнiкaцiйниx cиcтeм тa зaxиcтy iнфopмaцiї CБ Укpa
Tolubko, V., Kurchenko, O., Shevchenko, A.: Stabilization of the functional stability of the information system by controlling the dynamics of security profiles. Mod. Inf. Secur. 3, 51–57 (2018). https://doi.org/10.31673/2409-7292.2018.035157
Fahad Taha AL-Dhief and Naseer Sabri and N. M. Abdul Latiff and Nik Noordini Nik Abd. Malik and Musatafa Abbas Abbood Albader and Mazin Abed Mohammed and Rami Noori AL-Haddad and Yasir Dawood Salman and Mohd Khanapi Abd Ghani and Omar Ibrahim Obaid. Performance Comparison between TCP and UDP Protocols in Different Simulation Scenarios. Int J Eng Technol. 2018;7(4.36):172--176.]
Awang Nor, S., Alubady, R., Abduladeem, K.W.: Simulated performance of TCP, SCTP, DCCP and UDP protocols over 4G network. Proc. Comput. Sci. 111, 27 (2017). https://doi.org/10.1016/j.procs.2017.06.002
Baowan, D., Cox, B.J., Hilder, T.A., Hill, J.M., Thamwattana, N.: Mathematical preliminaries. In: Modelling and Mechanics of Carbon-Based Nanostructured Materials, pp. 35–58. Elsevier (2017). https://doi.org/10.1016/B978-0-12-812463-5.00002-9
TheThingsNetwork. The Things Network 2016 Update (2016). https://speakerdeck.com/wienke/the-things-network-2016-update.
Jebril, A., Sali, A., Ismail, A., Rasid, M.: Overcoming limitations of LoRa physical layer in image transmission. Sensors. 18(10), 3257 (2018). https://doi.org/10.3390/s18103257
PSNR. https://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004). https://doi.org/10.1109/TIP.2003.819861
Kirichek, R., Pham, V.D., Kolechkin, A, Al-Bahri, M., Paramonov, A.: Transfer of multimedia data via LoRa. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. ruSMART NsCC NEW2AN 2017 2017 2017. Lecture Notes in Computer Science, vol. 10531, pp. 708–720. Springer, Cham (2017). https://doi.org/10.1007/978-3319-67380-6_67
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Brazhenenko, M., Shevchenko, V., Bychkov, O., Petrova, P.V., Jekov, B., Kovatcheva, E. (2024). Securing and Analyzing Media Signal Transfer over LoRaWAN Networks. In: Tagarev, T., Stoianov, N. (eds) Digital Transformation, Cyber Security and Resilience. DIGILIENCE 2020. Communications in Computer and Information Science, vol 1790. Springer, Cham. https://doi.org/10.1007/978-3-031-44440-1_22
Download citation
DOI: https://doi.org/10.1007/978-3-031-44440-1_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-44439-5
Online ISBN: 978-3-031-44440-1
eBook Packages: Computer ScienceComputer Science (R0)