We assess the security mechanisms defined in the LoRaWAN and Z-Wave
specifications and describe own research to show, whether those security
mechanisms are sufficient. For this, we explain typical attacks on radio based
We further show which precautions are necessary not to undermine these
measures and whether additional security measures may be necessary.
The slides are available as PDF.
Protocol specifications of the named protocols