Security in low power wide area networks: State-of-the-art and development towards the 5G

Radek Fujdiak, Konstantin Mikhaylov, Martin Stusek, Pavel Masek, Ijaz Ahmad, Lukas Malina, Pawani Porambage, Miroslav Voznak, Ari Pouttu, Petr Mlynek

Research output: Chapter in Book/Report/Conference proceedingChapter or book articleScientificpeer-review

23 Citations (Scopus)


The chapter delivers the detailed discussion of the potential security threats, features, and mechanisms for the low-power wide-area (LPWA) networks in general, and the three dominant LPWA technologies—long-range wide-area network, cellular Internet of things (IoT) (e.g., Cat-NB1), and Sigfox, which currently dominate the market, in particular. We start by identifying the key actors, their interrelations, and interfaces in the context of a generalized LPWA network architecture and then determine the potential security threats and attack vectors. Next, we specify 16 major security features and discuss how each of the three technologies approaches each feature. This manner of presentation enables not only to develop an in-depth understanding of the security mechanism underlying particular LPWA technology but also facilitates comparison of the approaches taken by the technology developers and implementers. Finally, we also take a look in the future—toward the time when LPWA technology might get integrated with the 5G. Specifically, we focus on the security aspects related to the use of LPWA and IoT as a part of the 5G, identify the gaps, and discuss some of the further steps to be taken.
Original languageEnglish
Title of host publicationLPWAN Technologies for IoT and M2M Applications
ISBN (Print)978-0-12-818880-4
Publication statusPublished - 2020
MoE publication typeA3 Part of a book or another research book


  • Low-power wide-area networks
  • security
  • privacy
  • LoRaWAN
  • NB-IoT
  • 5G
  • Internet of things
  • machine-to-machine


Dive into the research topics of 'Security in low power wide area networks: State-of-the-art and development towards the 5G'. Together they form a unique fingerprint.

Cite this