What is it about?

The purpose of this paper is to discuss how to secure the confidentiality of LoRa communication between two devices using the MICKEY Cipher algorithm. The paper covers topics such as what LoRa is, its advantages and disadvantages, the security issues that arise with LoRa, the proposed solution to address those security issues, and the outcome of the implementation.

Featured Image

Why is it important?

This can help you to know if MICKEY Cipher can be implemented or not in securing LoRa communication.

Perspectives

The difficult part about this paper is to implement the correct MICKEY Cipher from Steven Babbage to the system created.

Faldo Bigdjaja Limas
Universitas Brawijaya

Read the Original

This page is a summary of: The Implementaion of MICKEY Cipher in Securing Constrained Devices Based on LoRa, October 2023, ACM (Association for Computing Machinery),
DOI: 10.1145/3626641.3627018.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page