Articles with "identification authentication" as a keyword



Adversarial Attack and Defense for LoRa Device Identification and Authentication via Deep Learning

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2025.3547645

Abstract: LoRa enables long-range, energy-efficient communication for Internet of Things (IoT) applications, making it an essential technology for low-power wide-area networks (LPWANs). However, its security remains a concern, particularly when reliable device identification and authentication are… read more here.

Keywords: deep learning; identification authentication; device identification;