Skip to main content

Advertisement

Table 1 Security comparison of three layers

From: Physical layer identification of LoRa devices using constellation trace figure

  Physical Transport Application
Anti-counterfeiting Strong Weak Weak
Portability Strong Weak Weak
Protocol complexity Simple Medium Complex
Anti-interference Weak Medium Medium