<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">ntv</journal-id><journal-title-group><journal-title xml:lang="ru">Научно-технический вестник информационных технологий, механики и оптики</journal-title><trans-title-group xml:lang="en"><trans-title>Scientific and Technical Journal of Information Technologies, Mechanics and Optics</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">2226-1494</issn><issn pub-type="epub">2500-0373</issn><publisher><publisher-name>Университет ИТМО</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.17586/2226-1494-2025-25-5-923-932</article-id><article-id custom-type="elpub" pub-id-type="custom">ntv-521</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>КОМПЬЮТЕРНЫЕ СИСТЕМЫ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>COMPUTER SCIENCE</subject></subj-group></article-categories><title-group><article-title>Экспериментальные результаты использования AES-128 в LoRaWAN</article-title><trans-title-group xml:lang="en"><trans-title>Experimental results of using AES-128 in LoRaWAN</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0009-0001-3355-1912</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Нуар</surname><given-names>А.</given-names></name><name name-style="western" xml:lang="en"><surname>Nouar</surname><given-names>A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Нуар Абделуахаб — аспирант</p><p>sc 58865584200</p><p>Шлеф, 02010</p></bio><bio xml:lang="en"><p>Abdelouahab Nouar — PhD Student</p><p>sc 58865584200</p><p>Chlef, 02010</p></bio><email xlink:type="simple">a.nouar@univ-chlef.dz</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-5132-2366</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Тахар Аббес</surname><given-names>М.</given-names></name><name name-style="western" xml:lang="en"><surname>Tahar Abbes</surname><given-names>M.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Тахар Аббес Мунир — профессор</p><p>sc 57212811077</p><p>Шлеф, 02010</p></bio><bio xml:lang="en"><p>Mounir Tahar Abbes — Professor</p><p>sc 57212811077</p><p>Chlef, 02010</p></bio><email xlink:type="simple">m.taharabbes@univ-chlef.dz</email><xref ref-type="aff" rid="aff-2"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-2603-2433</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Бумердасси</surname><given-names>С.</given-names></name><name name-style="western" xml:lang="en"><surname>Boumerdassi</surname><given-names>S.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Бумердасси Сельма — профессор</p><p>sc 6602291128</p><p>Париж, 75141</p></bio><bio xml:lang="en"><p>Selma Boumerdassi — Professor</p><p>sc 6602291128</p><p>Paris, 75141</p></bio><email xlink:type="simple">selma.boumerdassi@inria.fr</email><xref ref-type="aff" rid="aff-3"/></contrib><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-9137-9527</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Хаиб</surname><given-names>М.</given-names></name><name name-style="western" xml:lang="en"><surname>Chaib</surname><given-names>M.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Хаиб Мостефа — PhD, исследователь</p><p>sc 58835296600</p><p>Шлеф, 02010</p></bio><bio xml:lang="en"><p>Mostefa Chaib — PhD, Researcher</p><p>sc 58835296600</p><p>Chlef, 02010</p><p> </p></bio><email xlink:type="simple">m.chaib@univ-chlef.dz</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Университет Асиба Бенбуали Лаборатория ЛМА<country>Алжир</country></aff><aff xml:lang="en">Hassiba Ben Bouali University (UHBC), LMA Laboratory<country>Algeria</country></aff></aff-alternatives><aff-alternatives id="aff-2"><aff xml:lang="ru">Университет Асиба Бенбуали<country>Алжир</country></aff><aff xml:lang="en">Hassiba Ben Bouali University (UHBC)<country>Algeria</country></aff></aff-alternatives><aff-alternatives id="aff-3"><aff xml:lang="ru">Национальная консерватория искусств и ремесел<country>Франция</country></aff><aff xml:lang="en">Conservatoire National des Arts et Metiers (CNAM)<country>France</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2025</year></pub-date><pub-date pub-type="epub"><day>27</day><month>10</month><year>2025</year></pub-date><volume>25</volume><issue>5</issue><fpage>923</fpage><lpage>932</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Нуар А., Тахар Аббес М., Бумердасси С., Хаиб М., 2025</copyright-statement><copyright-year>2025</copyright-year><copyright-holder xml:lang="ru">Нуар А., Тахар Аббес М., Бумердасси С., Хаиб М.</copyright-holder><copyright-holder xml:lang="en">Nouar A., Tahar Abbes M., Boumerdassi S., Chaib M.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://ntv.elpub.ru/jour/article/view/521">https://ntv.elpub.ru/jour/article/view/521</self-uri><abstract><p>Технология Low Power Wide Area Networks (LPWAN) привлекает значительное внимание в Интернете вещей (IoT). Long-Range Wide-Area Networks (LoRaWAN) создан компанией Long Range (LoRa) как открытый нелицензионный стандарт. Его преимущества включают большую зону покрытия, низкое энергопотребление и недорогие чипы приемопередатчиков. Стандарт шифрования LoRaWAN использует 128-битный симметричный алгоритм Advanced Encryption Standard (AES). Этот стандарт защищает связь и объекты, что выгодно для устройств с ограниченными ресурсами в IoT для эффективной связи и безопасности. Проблемы безопасности сетей и устройств LoRa остаются важной задачей, учитывая широкое распространение этой технологии в многочисленных приложениях. Несмотря на то, что создатели LoRa улучшили архитектуру и безопасность сети LoRaWAN, последняя версия все еще имеет некоторые недостатки, такие как уязвимость к атакам. Многочисленные исследования показали, что версии LoRaWAN 1.0 и 1.1 содержат угрозы безопасности и уязвимости. В работе предлагается метод построения и интеграции криптографических алгоритмов (AES128) в широко используемых симуляторах беспроводных сетей NS-3. Целью данного средства является повышение безопасности данных в сетях LoRaWAN путем защиты критически важной информации от несанкционированного доступа. Внедрение алгоритма шифрования AES-128 в симулятор NS-3 позволит изучить влияние различных мер безопасности на показатели производительности сети, включая задержку, накладные расходы, энергопотребление, пропускную способность и размер пакета.</p></abstract><trans-abstract xml:lang="en"><p>In the Internet of Things (IoT), Low Power Wide Area Networks (LPWAN) technologies have been obtaining considerable attention. Long-Range Wide-Area Networks (LoRaWAN) was created by the Long Range (LoRa) Alliance as an open standard operating over the unlicensed band. Its advantages include a large coverage area, low power consumption, and inexpensive transceiver chips. The standard of LoRaWAN encryption uses a 128-bit symmetric algorithm called Advanced Encryption Standard (AES). This standard secures communication and entities which are beneficial for resource-constrained devices on the IoT for efficient communication and security. The security problems with LoRa networks and devices remain an important challenge considering the technology large deployment for numerous applications. Even though LoRaWAN network architecture and security have been enhanced by the LoRa Alliance, the most recent version still has some weaknesses such as its susceptibility to attacks. Many studies and researchers have indicated that LoRaWAN versions 1.0 and 1.1 have security risks and vulnerabilities. This research proposes a method to construct and integrate cryptographic algorithms (AES-128) within widely utilized wireless Network Server Simulators NS-3. This module aims to increase the security of data in LoRa networks by protecting critical information from unauthorized access. Consequently, implementing the AES-128 encryption algorithm within the NS-3 simulator will benefit the scientific community greatly. This will enable an examination of the impact of various security measures on network performance metrics, including latency, overhead, energy consumption, throughput, and packet size.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>LoRaWAN</kwd><kwd>криптография</kwd><kwd>LoRa</kwd><kwd>AES-128</kwd><kwd>security</kwd><kwd>NS-3</kwd><kwd>IoT</kwd></kwd-group><kwd-group xml:lang="en"><kwd>LoRaWAN</kwd><kwd>cryptography</kwd><kwd>LoRa</kwd><kwd>AES-128</kwd><kwd>security</kwd><kwd>NS-3</kwd><kwd>IoT</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Mostefa C., Mounir T.A., Abdelmadjid A.M., Nouar A. Ft-CSMA: A fine-tuned CSMA protocol for LoRa-based networks. Journal of Communications, 2024, vol. 19, no. 2, pp. 65–77. https://doi.org/10.12720/jcm.19.2.65-77</mixed-citation><mixed-citation xml:lang="en">Mostefa C., Mounir T.A., Abdelmadjid A.M., Nouar A. Ft-CSMA: A fine-tuned CSMA protocol for LoRa-based networks. Journal of Communications, 2024, vol. 19, no. 2, pp. 65–77. https://doi.org/10.12720/jcm.19.2.65-77</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Umbreen S., Shehzad D., Shafi N., Khan B., Habib U. An energyefficient mobility-based cluster head selection for lifetime enhancement of wireless sensor networks. IEEE Access, 2020, vol. 8, pp. 207779–207793. https://doi.org/10.1109/access.2020.3038031</mixed-citation><mixed-citation xml:lang="en">Umbreen S., Shehzad D., Shafi N., Khan B., Habib U. An energyefficient mobility-based cluster head selection for lifetime enhancement of wireless sensor networks. IEEE Access, 2020, vol. 8, pp. 207779–207793. https://doi.org/10.1109/access.2020.3038031</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Mostefa C., Abdelouahab N., Mounir T.A., Boumerdassi S., Femmam S., Amel Z.A. Formal validation of ADR protocol in LoRaWAN network using Event-b. Proc. of the 7th International Conference on Computer, Software and Modeling (ICCSM), 2023, pp. 11–15. https://doi.org/10.1109/ICCSM60247.2023.00011</mixed-citation><mixed-citation xml:lang="en">Mostefa C., Abdelouahab N., Mounir T.A., Boumerdassi S., Femmam S., Amel Z.A. Formal validation of ADR protocol in LoRaWAN network using Event-b. Proc. of the 7th International Conference on Computer, Software and Modeling (ICCSM), 2023, pp. 11–15. https://doi.org/10.1109/ICCSM60247.2023.00011</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Sornin N., Luis M., Eirich T., Kramp T., Hersent O. LoRaWAN Specification. V. 1. LoRa Alliance Inc., 2015, 82 p.</mixed-citation><mixed-citation xml:lang="en">Sornin N., Luis M., Eirich T., Kramp T., Hersent O. LoRaWAN Specification. V. 1. LoRa Alliance Inc., 2015, 82 p.</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">LoRaWAN® L2 1.0.4 Specification (TS001-1.0.4). Lora Alliance Technical Committee, 2020, 90 p.</mixed-citation><mixed-citation xml:lang="en">LoRaWAN® L2 1.0.4 Specification (TS001-1.0.4). Lora Alliance Technical Committee, 2020, 90 p.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Butun I., Pereira N., Gidlund M. Analysis of LoRaWAN v1.1 security: research paper. Proc. of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, 2018, pp. 1–6. https://doi.org/10.1145/3213299.3213304</mixed-citation><mixed-citation xml:lang="en">Butun I., Pereira N., Gidlund M. Analysis of LoRaWAN v1.1 security: research paper. Proc. of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, 2018, pp. 1–6. https://doi.org/10.1145/3213299.3213304</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Andreas W., de la Fuente A.G., Christoph L., Michael K. Physical layer security based key management for LoRaWAN. arXiv, 2021, arXiv:2101.02975. https://doi.org/10.48550/arXiv.2101.02975</mixed-citation><mixed-citation xml:lang="en">Andreas W., de la Fuente A.G., Christoph L., Michael K. Physical layer security based key management for LoRaWAN. arXiv, 2021, arXiv:2101.02975. https://doi.org/10.48550/arXiv.2101.02975</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">El Fehri C., Baccour N., Berthou P., Kammoun I. Experimental analysis of the over-the-air activation procedure in LoRaWAN. Proc. of the 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2021, pp. 30–35. https://doi.org/10.1109/wimob52687.2021.9606301</mixed-citation><mixed-citation xml:lang="en">El Fehri C., Baccour N., Berthou P., Kammoun I. Experimental analysis of the over-the-air activation procedure in LoRaWAN. Proc. of the 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2021, pp. 30–35. https://doi.org/10.1109/wimob52687.2021.9606301</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Tsai K.-L., Leu F.-Y., Hung L.-L., Ko C.-Y. Secure session key generation method for LoRaWAN servers. IEEE Access, 2020, vol. 8, pp. 54631–54640. https://doi.org/10.1109/ACCESS.2020.2978100</mixed-citation><mixed-citation xml:lang="en">Tsai K.-L., Leu F.-Y., Hung L.-L., Ko C.-Y. Secure session key generation method for LoRaWAN servers. IEEE Access, 2020, vol. 8, pp. 54631–54640. https://doi.org/10.1109/ACCESS.2020.2978100</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Hessel F., Almon L., Alvarez F. ChirpOTLE: a framework for practical LoRaWAN security evaluation. Proc. of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020, pp. 306–316. https://doi.org/10.1145/3395351.3399423</mixed-citation><mixed-citation xml:lang="en">Hessel F., Almon L., Alvarez F. ChirpOTLE: a framework for practical LoRaWAN security evaluation. Proc. of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020, pp. 306–316. https://doi.org/10.1145/3395351.3399423</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Pospisil O., Fujdiak R., Mikhaylov K., Ruotsalainen H., Misurec J. Testbed for LoRaWAN security: design and validation through manin-the-middle attacks study. Applied Sciences, 2021, vol. 11, no. 16, pp. 7642. https://doi.org/10.3390/app11167642</mixed-citation><mixed-citation xml:lang="en">Pospisil O., Fujdiak R., Mikhaylov K., Ruotsalainen H., Misurec J. Testbed for LoRaWAN security: design and validation through manin-the-middle attacks study. Applied Sciences, 2021, vol. 11, no. 16, pp. 7642. https://doi.org/10.3390/app11167642</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Tsai K.-L., Leu F.-Y., You I., Chang S.-W., Hu S.-J., Park H. Lowpower AES data encryption architecture for a LoRaWAN. IEEE Access, 2019, vol. 7, pp. 146348–146357. https://doi.org/10.1109/access.2019.2941972</mixed-citation><mixed-citation xml:lang="en">Tsai K.-L., Leu F.-Y., You I., Chang S.-W., Hu S.-J., Park H. Lowpower AES data encryption architecture for a LoRaWAN. IEEE Access, 2019, vol. 7, pp. 146348–146357. https://doi.org/10.1109/access.2019.2941972</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Thaenkaew P., Quoitin B., Meddahi A. Evaluating the cost of beyond AES-128 LoRaWAN security. Proc. of the International Symposium on Networks, Computers and Communications (ISNCC), 2022, pp. 1–6. https://doi.org/10.1109/isncc55209.2022.9851811</mixed-citation><mixed-citation xml:lang="en">Thaenkaew P., Quoitin B., Meddahi A. Evaluating the cost of beyond AES-128 LoRaWAN security. Proc. of the International Symposium on Networks, Computers and Communications (ISNCC), 2022, pp. 1–6. https://doi.org/10.1109/isncc55209.2022.9851811</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Naoui S., Elhdhili M.E., Saidane L.A. Trusted third party based key management for enhancing LoRaWAN security. Proc. of the IEEE/ ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017, pp. 1306–1313. https://doi.org/10.1109/AICCSA.2017.73</mixed-citation><mixed-citation xml:lang="en">Naoui S., Elhdhili M.E., Saidane L.A. Trusted third party based key management for enhancing LoRaWAN security. Proc. of the IEEE/ ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017, pp. 1306–1313. https://doi.org/10.1109/AICCSA.2017.73</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Jalowiczor J., Rozhon J., Voznak M. Study of the efficiency of fog computing in an optimized LoRaWAN cloud architecture. Sensors, 2021, vol. 21, no. 9, pp. 3159. https://doi.org/10.3390/s21093159</mixed-citation><mixed-citation xml:lang="en">Jalowiczor J., Rozhon J., Voznak M. Study of the efficiency of fog computing in an optimized LoRaWAN cloud architecture. Sensors, 2021, vol. 21, no. 9, pp. 3159. https://doi.org/10.3390/s21093159</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Qadir J., Butun I., Gastaldo P., Aiello O., Caviglia D.D. Mitigating cyber attacks in LoRaWAN via lightweight secure key management scheme. IEEE Access, 2023, vol. 11, pp. 68301–68315. https://doi.org/10.1109/ACCESS.2023.3291420</mixed-citation><mixed-citation xml:lang="en">Qadir J., Butun I., Gastaldo P., Aiello O., Caviglia D.D. Mitigating cyber attacks in LoRaWAN via lightweight secure key management scheme. IEEE Access, 2023, vol. 11, pp. 68301–68315. https://doi.org/10.1109/ACCESS.2023.3291420</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Hanna Y., Cebe M., Leon J., Akkaya K. Efficient group key management for resilient operation of LoRaWAN-based smart grid applications. IEEE Transactions on Control Systems Technology, 2024, vol. 32, no. 5, pp. 1706–1717. https://doi.org/10.1109/tcst.2024.3378988</mixed-citation><mixed-citation xml:lang="en">Hanna Y., Cebe M., Leon J., Akkaya K. Efficient group key management for resilient operation of LoRaWAN-based smart grid applications. IEEE Transactions on Control Systems Technology, 2024, vol. 32, no. 5, pp. 1706–1717. https://doi.org/10.1109/tcst.2024.3378988</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Han B., Li Y., Wang X., Li H., Huang J. FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN. Future Generation Computer Systems, 2023, vol. 140, pp. 253–265. https://doi.org/10.1016/j.future.2022.10.018</mixed-citation><mixed-citation xml:lang="en">Han B., Li Y., Wang X., Li H., Huang J. FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN. Future Generation Computer Systems, 2023, vol. 140, pp. 253–265. https://doi.org/10.1016/j.future.2022.10.018</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Islam M., Jamil H.M.M., Pranto S.A., Das R.K., Amin A., Khan A. Future industrial applications: exploring LPWAN-driven IoT protocols. Sensors, 2024, vol. 24, no. 8, pp. 2509. https://doi.org/10.3390/s24082509</mixed-citation><mixed-citation xml:lang="en">Islam M., Jamil H.M.M., Pranto S.A., Das R.K., Amin A., Khan A. Future industrial applications: exploring LPWAN-driven IoT protocols. Sensors, 2024, vol. 24, no. 8, pp. 2509. https://doi.org/10.3390/s24082509</mixed-citation></citation-alternatives></ref><ref id="cit20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Na S., Hwang D., Shin W., Kim K.-H. Scenario and countermeasure for replay attack using join request messages in LoRaWAN. Proc. of the International Conference on Information Networking (ICOIN), 2017, pp. 718–720. https://doi.org/10.1109/ICOIN.2017.7899580</mixed-citation><mixed-citation xml:lang="en">Na S., Hwang D., Shin W., Kim K.-H. Scenario and countermeasure for replay attack using join request messages in LoRaWAN. Proc. of the International Conference on Information Networking (ICOIN), 2017, pp. 718–720. https://doi.org/10.1109/ICOIN.2017.7899580</mixed-citation></citation-alternatives></ref><ref id="cit21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">Kang J.-M., Lim D.-W. On the quasi-orthogonality of LoRa modulation. IEEE Internet of Things Journal, 2023, vol. 10, no. 14, pp. 12366–12378. https://doi.org/10.1109/jiot.2023.3245885</mixed-citation><mixed-citation xml:lang="en">Kang J.-M., Lim D.-W. On the quasi-orthogonality of LoRa modulation. IEEE Internet of Things Journal, 2023, vol. 10, no. 14, pp. 12366–12378. https://doi.org/10.1109/jiot.2023.3245885</mixed-citation></citation-alternatives></ref><ref id="cit22"><label>22</label><citation-alternatives><mixed-citation xml:lang="ru">Tsai K.-L., Huang Y.-L., Leu F.-Y., You I., Huang Y.-L., Tsai C.-H. AES-128 based secure low power communication for LoRaWAN IoT environment. IEEE Access, 2018, vol. 6, pp. 45325–45334. https://doi.org/10.1109/access.2018.2852563</mixed-citation><mixed-citation xml:lang="en">Tsai K.-L., Huang Y.-L., Leu F.-Y., You I., Huang Y.-L., Tsai C.-H. AES-128 based secure low power communication for LoRaWAN IoT environment. IEEE Access, 2018, vol. 6, pp. 45325–45334. https://doi.org/10.1109/access.2018.2852563</mixed-citation></citation-alternatives></ref><ref id="cit23"><label>23</label><citation-alternatives><mixed-citation xml:lang="ru">Abboud S., Abdoun N. Enhancing LoRaWAN security: an advanced AES-based cryptographic approach. IEEE Access, 2024, vol. 12, P. 2589–2606. https://doi.org/10.1109/ACCESS.2023.3348416</mixed-citation><mixed-citation xml:lang="en">Abboud S., Abdoun N. Enhancing LoRaWAN security: an advanced AES-based cryptographic approach. IEEE Access, 2024, vol. 12, P. 2589–2606. https://doi.org/10.1109/ACCESS.2023.3348416</mixed-citation></citation-alternatives></ref><ref id="cit24"><label>24</label><citation-alternatives><mixed-citation xml:lang="ru">Nouar A., Abbes M.T., Boumerdassi S., Chaib M. Impact of mobility model on LoRaWAN performance. Journal of Communications, 2024, vol. 19, no. 1. pp. 7–18. https://doi.org/10.12720/jcm.19.1.7-18</mixed-citation><mixed-citation xml:lang="en">Nouar A., Abbes M.T., Boumerdassi S., Chaib M. Impact of mobility model on LoRaWAN performance. Journal of Communications, 2024, vol. 19, no. 1. pp. 7–18. https://doi.org/10.12720/jcm.19.1.7-18</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
