Security FAQ

Issue link: https://read.uberflip.com/i/1510695

Contents of this Issue


Page 4 of 4

5177 Brandi n Court, Frem ont, CA94538 | Tel : +1 51 0 -4 9 2 -4044 | Fax : +1 510 -4 9 2 -4001 | www.l o ra -al l i anc e.org Security FAQ elements. HTTPS and VPN technologies are recommended for securing communication between these critical network elements, in much the same way as is done in any other telecom systems. If LoRaWAN uses an unlicensed band, is it secure? LoRaWAN networks typically operate in unlicensed Industrial, Scientific and Medical (ISM) bands. Competing licensed-spectrum system providers often try to imply that ISM bands are unregulated and noisy, however the ISM bands are heavily regulated in their respective jurisdictions to ensure fair co-existence of devices using them. The resilient LoRa Spread Spectrum modulation scheme can demodulate a signal down to 17 dB below the noise floor, ensuring optimal performance in the presence of interference, which can happen in any band, licensed or unlicensed. What should I do if I find a vulnerability in the LoRaWAN specifications? The importance of security in the LoRaWAN specifications is taken very seriously by the LoRa Alliance, and every effort is made to ensure the security foundation is solid. However, if any part of the LoRaWAN specifications is considered to have a vulnerability, the LoRa Alliance should be notified at security@lora- alliance.org. If the vulnerability is an implementation security issue, this would need to be taken up by the relevant manufacturers. If the vulnerability is a deployment issues, this would need to be taken up with the relevant network operator(s). Where are the LoRaWAN security mechanisms specified? All security mechanisms are defined in the LoRa Alliance specifications, which can be downloaded by the public from https://lora-alliance.org/resource-hub.

Articles in this issue

Links on this page

view archives of FAQ - Security FAQ