What is it about?
The purpose of this paper is to discuss how to secure the confidentiality of LoRa communication between two devices using the MICKEY Cipher algorithm. The paper covers topics such as what LoRa is, its advantages and disadvantages, the security issues that arise with LoRa, the proposed solution to address those security issues, and the outcome of the implementation.
Featured Image
Photo by Zan on Unsplash
Why is it important?
This can help you to know if MICKEY Cipher can be implemented or not in securing LoRa communication.
Perspectives
The difficult part about this paper is to implement the correct MICKEY Cipher from Steven Babbage to the system created.
Faldo Bigdjaja Limas
Universitas Brawijaya
Read the Original
This page is a summary of: The Implementaion of MICKEY Cipher in Securing Constrained Devices Based on LoRa, October 2023, ACM (Association for Computing Machinery),
DOI: 10.1145/3626641.3627018.
You can read the full text:
Resources
Contributors
The following have contributed to this page







