LoRa's network is flexible and convenient: on-demand deployment, planning and deploying the network according to the needs of the application; according to the field environment, targeting the location of the endpoints, and rationally deploying the gateway and terminal equipment. The expansion of the network is very simple, according to the changes in the size of the node, enhancement or expansion of the coverage at any time. At the same time, LoRa can be independently networked: individuals, enterprises or organisations can deploy private/proprietary networks, enterprise networks or industry networks (License-free bands). Most IoT applications are regional, and small-scale networks are the answer. A regional local area network is an effective and necessary complement to the public network.
From a physical layer analysis, the security of the data is mainly reflected in the covert nature of the signal, i.e., it is not easily detected, and there is little interference with various narrowband communication systems .
As compared with the communication rate, the spread spectrum signal is expanded in a relatively wide frequency band, the power in the unit frequency band is very small, the signal is annihilated in the noise, and it is generally not easy to be detected, and the concealment is better. Furthermore, because the spread spectrum signal has a very low power spectral density, it interferes very little with the various narrowband communication systems in use. In terms of security LoRa technology also inherits the advantages of spread spectrum technology, general equipment is difficult to detect and interfere with the LoRa signal.
Among all the IoT communication technologies, LoRa technology can demodulate at 20dB under noise, whereas other IoT communication technologies have to be above the noise by a certain intensity to achieve demodulation.
Waveforms from other IoT communication technologies can be captured by devices such as spectrometers. Similarly, these communication data can be interfered or forged. LoRa technology, on the other hand, has better stealth and anti-jamming properties with strong physical layer security features.
From the analysis of the data transmission process, the data of the terminal equipment using public network technology firstly reaches the base station, then reaches the mobile exchange centre, and finally reaches the operator's cloud before the final data is forwarded to the client's application or the client's cloud. The final data is then forwarded to the client application or the client's cloud. There is no need to send the data to the operator's cloud before sending it directly to the client. The LoRa data from the private network is collected and calculated locally, and the data does not even leave the campus. The farther the data transmission, the more transit times, the higher the security risk, while using private network technology data can be completely stored locally, the data is always in their hands.
From the analysis of data encryption methods, it can be seen that the security of LoRa can be strongly guaranteed. From the analysis of the application layer, users can encrypt according to the actual application requirements, because LoRa has strong flexibility in the group network, its application side security management means can cooperate with the network layer and encryption algorithms to achieve the overall security of the whole application.