An efficient security framework, vulnerabilities, and defense mechanisms in LoraWAN

Farhan Nisar, Baseer Ali Rehman

Article ID: 3072
Vol 3, Issue 2, 2025
DOI: https://doi.org/10.54517/cte3072
Received: 16 November 2024; Accepted: 13 March 2025; Available online: 1 April 2025; Issue release: 30 June 2025


Download PDF

Abstract

The rapid expansion of cloud computing within business environments, along with the increasing complexity of organizational deployments, has led to a surge in cloud-based attacks on computer networks. These attacks exploit security vulnerabilities and systemic breaches. This study explores robust defense mechanisms by leveraging policy-based configurations and rule enforcement on edge network devices. These mechanisms were tested using GNS3 simulations to strengthen internal and external infrastructures against critical threats such as ICMP, CDP, and port security attacks.


Keywords

exploits; cybersecurity; infrastructure; denial-of-service (DoS); Internet control message protocol (ICMP); cisco discovery protocol (CDP); port-level safeguarding


References

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Author(s)

License URL: https://creativecommons.org/licenses/by/4.0/