Skip to main content

Table 1 Security comparison of three layers

From: Physical layer identification of LoRa devices using constellation trace figure

 

Physical

Transport

Application

Anti-counterfeiting

Strong

Weak

Weak

Portability

Strong

Weak

Weak

Protocol complexity

Simple

Medium

Complex

Anti-interference

Weak

Medium

Medium