|
[1] Ericsson, “Ericsson mobility report,” White paper, 2015. [2] LoRa Alliance, “LoRaWAN specification,” Jul. 2016, Available: http://lora-alliance.org [3] “Sigfox,” [Online]. Available: http://www.sigfox.com. [4] Weightless open standard, [Online]. Available: http://www.weightless.org. [5] Semtech, “LoRa Packet Forwarder,” [Online]. Available: https://github.com/Lora-net/packet_forwarder [6] “MQTT,” [Online]. Available: http://mqtt.org [7] Gemtek, “GIoT,” [Online]. Available: www.giotnetwork.com [8] “LORIOT,” [Online]. Available: www.loriot.io [9] Broccar, “LoRa Server,” [Online]. Available: http://docs.loraserver.io/loraserver/ [10] “MQTT 3.1.1 specification”. OASIS. December 10, 2015. Retrieved April 25, 2017. [11] Network Working Group of the IETF, January 2006, RFC 4251, The Secure Shell (SSH) Protocol Architecture. [12] “More deeply, the framework exists to separate the representation of information from user interaction.” The DCI Architecture: A New Vision of Object-Oriented Programming – Trygve Reenskaug and James Coplien – March 20, 2009. [13] “Puma,” [Online]. Available: https://github.com/puma/puma [14] “Rack,” [Online]. Available: http://rack.github.io [15] “Sinatra,” [Online]. Available: http://www.sinatrarb.com [16] “SQLite,” [Online]. Available: https://www.sqlite.org [17] “PostgreSQL,” [Online]. Available: https://www.postgresql.org [18] “LinkIt ONE,” [Online]. Available: https://labs.mediatek.com/zh-tw/platform/linkit-one [19] Qian Dong and Waltenegus Dargie, “Evaluation of the Reliability of RSSI for Indoor Localization”, 2012 International Conference on Wireless Communications in Underground and Confined Areas, 2012. [20] Martin Bor, John Vidler, Utz Roedig, “LoRa for the Internet of Things”, Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks, February 15-17, 2016, Graz, Austria. [21] K. Mikhaylov, J. Petäjäjärvi, T. Haenninen. “Analysis of Capacity and Scalability of the LoRa Low Power Wide Area Network Technology”, European Wireless 2016 22th European Wireless Conference Proceedings of. VDE VERLAG GmbH, 2016. [22] Sarra Naoui, Mohamed Elhoucine Elhdhili, Leila Azouz Saidane. “Enhancing the security of the IoT LoraWAN architecture”, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), 2016. [23] Semtech Ltd, “LoRaWAN Network Server Demonstration: Gateway to Server Interface Definition,” 2015. [24] Semtech Ltd, “LoRaWAN Network Server Demonstration: Inter-Server interface definition,” 2015. [25] ECMA International, The JSON Data Interchange Format, 2013. [26] Tony Rosati, “LoRaWAN Security Overview,” 2017, [Online]. Available: http://www.trustpointinnovation.com/blog/2017/01/17/lorawan-security-overview/
|