Connections the quarterly journal

Search form

  • Like Connections page on Facebook(link is external)
  • Follow us on Twitter(link is external)
  • Find connections on Istagram(link is external)
  • Connect with us on LinkedIN(link is external)
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

LoRa-Key: Secure Key Generation System for LoRa-Based Network

Publication Type:

Journal Article

Authors:

Weitao Xu; Sanjay Jha; Wen Hu

Source:

IEEE Internet of Things Journal , Volume 6, Issue 4, p.6404-6416 (2019)
  • 3774 reads
  • Google Scholar(link is external)
  • DOI(link is external)
  • RTF
  • EndNote XML

Active calls for articles

Empowering the Trans-Atlantic Defense Industrial Base

Deadline:
30.06.2025

Hybrid Operations

Deadline:
15.09.2025

Check also our Google Scholar profile(link is external)

  • Downloads
  • Cited in
  • How to cite
No files have yet been downloaded.
Brazhenenko, Maksym, Victor Shevchenko, Oleksiy Bychkov, Boyan Jekov, Pepa Petrova, and Eugenia Kovatcheva. "Adopting Machine Learning for Images Transferred with LoRaWAN." Information & Security: An International Journal 47, no. 2 (2020): 172-186.
APA style: Xu, W., Jha S., & Hu W. (2019).  LoRa-Key: Secure Key Generation System for LoRa-Based Network. IEEE Internet of Things Journal . 6(4), 6404-6416.
Chicago style: Xu, Weitao, Sanjay Jha, and Wen Hu. "LoRa-Key: Secure Key Generation System for LoRa-Based Network." IEEE Internet of Things Journal 6, no. 4 (2019): 6404-6416.
IEEE style: Xu, W., S. Jha, and W. Hu, "LoRa-Key: Secure Key Generation System for LoRa-Based Network", IEEE Internet of Things Journal , vol. 6, issue 4, pp. 6404-6416, 2019.
DOI 10.1109/JIOT.2018.2888553(link is external)
  • Trending(active tab)
  • Latest
  • Most cited
  • The Weaponization of Emerging Technologies and Their Impact on Global Risk: A Perspective from the PfPC Emerging Security Challenges Working Group (1,754)
  • Towards a New Role for the European Union in the South Caucasus? (1,305)
  • Goodbye Globalization? Hello 'Fragmentegration'! - The World Economy and Strategic Competition (1,283)
  • Hybrid Threats and Strategic Competition (1,235)
  • The PfP Consortium Regional Stability in South East Europe Working Group at 25: The Transformed Balkans and the Work Ahead (1,197)
view all
  • Communicating (In)Security in Ukraine
  • Hybrid Warfare in the Black Sea Region: Russian Information-Psychological Operations in Georgia
  • Ukraine's Component in the Platform of European Memory and Conscience
  • Kremlin's 'War on Terrorism' in the Northeastern Caucasus: How Chechnya Still 'Saves' Russia
  • A Theory of Change: 25 Years of the Partnership for Peace Consortium
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
From Civil-Military Relations to Resilience: The Fifth Wave of Strengthening Democracy through Research and Education (4)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes(link is external), 2012-2025
This site was designed and is maintained by Procon Ltd.(link is external), Executive publisher of Connections: The Quarterly Journal