What is LoRa technology?

158 views 2 replies
Reply to Topic
Binda

Age: 2023
Total Posts: 36
Points: 10

Location:
,
As a mature and stable Internet of Things (IoT) technology, LoRa is developing rapidly and has formed a huge ecosystem, including terminal hardware manufacturers, chip manufacturers, module gateway manufacturers, software vendors, system integrators, network operators, etc. The industry chain includes terminal hardware manufacturers, chip manufacturers, module gateway manufacturers, software vendors, system integrators, and network operators. With its low power consumption, long transmission distance, strong penetration, flexible networking, easy to deploy and other technical characteristics, as well as "self-organisation, security and controllability", it is widely used in many fields, such as epidemic prevention and control and medical healthcare, intelligent agriculture and animal husbandry management, smart buildings, smart parks, smart metering and energy management, smart cities, smart logistics and smart manufacturing. It is widely used in many fields.
 ?
LoRa, Long Range, is a physical layer wireless digital communication modulation technology, also known as Spread Spectrum Continuous FM modulation technology. Characterised by the same power consumption than other wireless methods to spread the distance farther, to achieve the unity of low power consumption and long range, in the same power consumption than the traditional wireless communication radio frequency communication distance expanded by 3-5 times.
 
LoRa is only a modulation technology in the physical layer, and its networking method can be chosen differently according to different applications and needs. Commonly used in practical applications are: point-to-point, star, tree, mesh, mesh and other forms of networking.

 

LoRa's network is flexible and convenient: on-demand deployment, planning and deploying the network according to the needs of the application; according to the field environment, targeting the location of the endpoints, and rationally deploying the gateway and terminal equipment. The expansion of the network is very simple, according to the changes in the size of the node, enhancement or expansion of the coverage at any time. At the same time, LoRa can be independently networked: individuals, enterprises or organisations can deploy private/proprietary networks, enterprise networks or industry networks (License-free bands). Most IoT applications are regional, and small-scale networks are the answer. A regional local area network is an effective and necessary complement to the public network.
 
From a physical layer analysis, the security of the data is mainly reflected in the covert nature of the signal, i.e., it is not easily detected, and there is little interference with various narrowband communication systems .
 
As compared with the communication rate, the spread spectrum signal is expanded in a relatively wide frequency band, the power in the unit frequency band is very small, the signal is annihilated in the noise, and it is generally not easy to be detected, and the concealment is better. Furthermore, because the spread spectrum signal has a very low power spectral density, it interferes very little with the various narrowband communication systems in use. In terms of security LoRa technology also inherits the advantages of spread spectrum technology, general equipment is difficult to detect and interfere with the LoRa signal.
 
Among all the IoT communication technologies, LoRa technology can demodulate at 20dB under noise, whereas other IoT communication technologies have to be above the noise by a certain intensity to achieve demodulation.
 
Waveforms from other IoT communication technologies can be captured by devices such as spectrometers. Similarly, these communication data can be interfered or forged. LoRa technology, on the other hand, has better stealth and anti-jamming properties with strong physical layer security features.

From the analysis of the data transmission process, the data of the terminal equipment using public network technology firstly reaches the base station, then reaches the mobile exchange centre, and finally reaches the operator's cloud before the final data is forwarded to the client's application or the client's cloud. The final data is then forwarded to the client application or the client's cloud. There is no need to send the data to the operator's cloud before sending it directly to the client. The LoRa data from the private network is collected and calculated locally, and the data does not even leave the campus. The farther the data transmission, the more transit times, the higher the security risk, while using private network technology data can be completely stored locally, the data is always in their hands.
 
From the analysis of data encryption methods, it can be seen that the security of LoRa can be strongly guaranteed. From the analysis of the application layer, users can encrypt according to the actual application requirements, because LoRa has strong flexibility in the group network, its application side security management means can cooperate with the network layer and encryption algorithms to achieve the overall security of the whole application.

Posted 09 Aug 2023

Reply to Topic