The document discusses security in LoRaWAN networks. It describes how LoRaWAN uses cryptographic techniques like AES encryption with keys, and message authentication codes to provide security features like mutual authentication, integrity protection, and encryption. It explains the join procedure where devices are provisioned with session keys to communicate securely. Improvements in LoRaWAN 1.1 like additional replay protection and separation of security realms are also summarized. The document recommends best practices for provisioning devices securely and maintaining security across the entire IoT system.
Actility is already a central piece for many Network Provider
Actility is already powering many Operator NS, and will manage connectivity agreement from this central JS to all Actility-powered NS.
Actility is contributing actively in interconnecting Network Providers together and to a central Activation service
Active contributor at Alliance
ThingPark Exchange helps with roaming in context where direct one2one agreements are complex to set in place
Actility helping large enterprise players to deploy their own dedicated networks
But leaving possibility to roam with major Network Providers
And activate their devices everywhere
Actility helping the device ecosystem
Provides visibility through Marketplace
Lead Alliance Dev community WG – interop engine
Ease activation onboarding
Actility exposes data through TPX
Data transformation
Connection to major AEPs