LoRaWAN Security
We have compiled information about LoRaWAN use cases, attacks and security on 16 pages. In our E-Book you will learn for which use cases LoRa-WAN is secure enough.

Topics
LoRaWAN Use-Cases
We describe in detail the use cases and properties of LoRaWAN.
Attacks on LoRa networks
We take a close look at the motivations and benefits for attackers.
Security measures
We show the built-in security measures of the LoRaWAN networks and their vulnerabilities.
Recommendations
We give you concrete recommendations which you should consider when setting up a LoRaWAN network.

Author Elisabeth Schloten
Elisabeth Schloten has been the founder and managing director of ECBM GmbH since 2017. With ECBM, Ms. Schloten stands for driving digitization forward in a way that companies and their employees have real advantages. Before founding the company, Ms. Schloten worked very successfully for top management companies such as McKinsey and international corporations such as Procter & Gamble and Vodafone in Germany and abroad.
Free E-BOOK
The link to the free e-book about LoRaWAN security will be sent to your e-mail address.