Skip to main content
Erschienen in:
Buchtitelbild

2022 | OriginalPaper | Buchkapitel

Secure LoRaWAN Root Key Update Scheme for IoT Environment

verfasst von : Kun-Lin Tsai, Li-Woei Chen, Fang-Yie Leu, Hsiung-Chieh Hsu, Chuan-Tian Wu

Erschienen in: Mobile Internet Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) is an essential infrastructure in many fields, such as industry and agriculture. Sensor design, communication scheme, data security, and data analysis are four important topics in the IoT research field. LoRaWAN, one of unlicensed-band based long range wide area network specifications, is very suitable for an IoT system due to the feature of low-power and long-range communication. To enhance the communication security, LoRaWAN encrypts transmitted data with different session keys which are derived from two root keys. However, these root keys stored in the end-device is easily stolen by attackers, thus threatening communication security. In this paper, a root key update scheme is proposed to periodically renew the root keys so that the security level of LoRaWAN can be enhanced. The simulation results by using the Scyther, a security analysis tool, demonstrate that the procedure of the proposed scheme is secure. Besides, the security discussion also shows that the proposed scheme provides the features of mutual authentication, confidentiality and message integrity, and can also resist replay and eavesdropping attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aheleroff, S., et al.: IoT-enabled smart appliances under industry 4.0: a case study. Adv. Eng. Inform. 43(101043), 1–14 (2020) Aheleroff, S., et al.: IoT-enabled smart appliances under industry 4.0: a case study. Adv. Eng. Inform. 43(101043), 1–14 (2020)
2.
Zurück zum Zitat Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing Google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(1), 35–53 (2020) Caputo, D., Verderame, L., Ranieri, A., Merlo, A., Caviglione, L.: Fine-hearing Google home: why silence will not protect your privacy. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(1), 35–53 (2020)
3.
Zurück zum Zitat Angin, P., Anisi, M.H., Göksel, F., Gürsoy, C., Büyükgülcü, A.: AgriLoRa: a digital twin framework for smart agriculture. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 77–96 (2020) Angin, P., Anisi, M.H., Göksel, F., Gürsoy, C., Büyükgülcü, A.: AgriLoRa: a digital twin framework for smart agriculture. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 11(4), 77–96 (2020)
4.
Zurück zum Zitat Badii, C., Bellini, P., Difino, A., Nesi, P.: Smart city IoT platform respecting GDPR privacy and security aspects. IEEE Access 8, 23601–23623 (2020)CrossRef Badii, C., Bellini, P., Difino, A., Nesi, P.: Smart city IoT platform respecting GDPR privacy and security aspects. IEEE Access 8, 23601–23623 (2020)CrossRef
5.
Zurück zum Zitat Shariatzadeh, N., Lundholm, T., Lindberg, L., Sivard, G.: Integration of digital factory with smart factory based on internet of things. Proc. Cirp 50, 512–517 (2016)CrossRef Shariatzadeh, N., Lundholm, T., Lindberg, L., Sivard, G.: Integration of digital factory with smart factory based on internet of things. Proc. Cirp 50, 512–517 (2016)CrossRef
6.
Zurück zum Zitat Liu, Y., Liu, L., Chen, W.P.: Intelligent traffic light control using distributed multi-agent Q learning. In: 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), pp. 1–8 (2017) Liu, Y., Liu, L., Chen, W.P.: Intelligent traffic light control using distributed multi-agent Q learning. In: 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), pp. 1–8 (2017)
7.
Zurück zum Zitat Qian, K., Zhang, Z., Yamamoto, Y., Schuller, B.W.: Artificial intelligence internet of things for the elderly: from assisted living to health-care monitoring. IEEE Signal Process. Mag. 38(4), 78–88 (2021)CrossRef Qian, K., Zhang, Z., Yamamoto, Y., Schuller, B.W.: Artificial intelligence internet of things for the elderly: from assisted living to health-care monitoring. IEEE Signal Process. Mag. 38(4), 78–88 (2021)CrossRef
8.
Zurück zum Zitat Katayama, K., Takahashi, H., Yokoyama, S., Gäfvert, K., Kinoshita, T.: Evacuation guidance support using cooperative agent-based IoT devices. In: 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), pp. 1–2 (2017) Katayama, K., Takahashi, H., Yokoyama, S., Gäfvert, K., Kinoshita, T.: Evacuation guidance support using cooperative agent-based IoT devices. In: 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), pp. 1–2 (2017)
11.
Zurück zum Zitat Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure Internet of Things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020) Alizadeh, M., Andersson, K., Schelén, O.: A survey of secure Internet of Things in relation to blockchain. J. Internet Serv. Inf. Secur. (JISIS) 10(3), 47–75 (2020)
12.
Zurück zum Zitat Hui, H., et al.: Survey on blockchain for internet of things. J. Internet Serv. Inf. Secur. (JISIS) 9(2), 1–30 (2019) Hui, H., et al.: Survey on blockchain for internet of things. J. Internet Serv. Inf. Secur. (JISIS) 9(2), 1–30 (2019)
13.
Zurück zum Zitat Pub, N.F.: Announcing the advanced encryption standard (AES). Federal Inf. Process. Stand. Publ. 197, 1–51 (2001) Pub, N.F.: Announcing the advanced encryption standard (AES). Federal Inf. Process. Stand. Publ. 197, 1–51 (2001)
14.
Zurück zum Zitat Tsai, K.L., Leu, F.Y., Hung, L.L., Ko, C.Y.: Secure session key generation method for LoRaWAN servers. IEEE Access 8, 54631–54640 (2020)CrossRef Tsai, K.L., Leu, F.Y., Hung, L.L., Ko, C.Y.: Secure session key generation method for LoRaWAN servers. IEEE Access 8, 54631–54640 (2020)CrossRef
15.
Zurück zum Zitat Noura, H., Hatoum, T., Salman, O., Yaacoub, J.P., Chehab, A.: LoRaWAN security survey: issues, threats and possible mitigation techniques. Internet Things 100303, 1–37 (2020) Noura, H., Hatoum, T., Salman, O., Yaacoub, J.P., Chehab, A.: LoRaWAN security survey: issues, threats and possible mitigation techniques. Internet Things 100303, 1–37 (2020)
16.
Zurück zum Zitat Tsai, K.L., Leu, F.Y., You, I., Chang, S.W., Hu, S.J., Park, H.: Low-power AES data encryption architecture for a LoRaWAN. IEEE Access 7, 146348–146357 (2019)CrossRef Tsai, K.L., Leu, F.Y., You, I., Chang, S.W., Hu, S.J., Park, H.: Low-power AES data encryption architecture for a LoRaWAN. IEEE Access 7, 146348–146357 (2019)CrossRef
17.
Zurück zum Zitat You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.T.: An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18(6), 1888 (2018)CrossRef You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.T.: An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18(6), 1888 (2018)CrossRef
18.
Zurück zum Zitat Raad, N., Hasan, T., Chalak, A., Waleed, J.: Secure data in lorawan network by adaptive method of elliptic-curve cryptography. In: 2019 International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA), pp. 1–6 (2019) Raad, N., Hasan, T., Chalak, A., Waleed, J.: Secure data in lorawan network by adaptive method of elliptic-curve cryptography. In: 2019 International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA), pp. 1–6 (2019)
19.
Zurück zum Zitat Naoui, S., Elhdhili, M.E., Saidane, L.A.: Trusted third party based key management for enhancing LoRaWAN security. In: 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), pp. 1306–1313 (2017) Naoui, S., Elhdhili, M.E., Saidane, L.A.: Trusted third party based key management for enhancing LoRaWAN security. In: 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), pp. 1306–1313 (2017)
20.
Zurück zum Zitat Eldefrawy, M., Butun, I., Pereira, N., Gidlund, M.: Formal security analysis of LoRaWAN. Comput. Netw. 148, 328–339 (2019)CrossRef Eldefrawy, M., Butun, I., Pereira, N., Gidlund, M.: Formal security analysis of LoRaWAN. Comput. Netw. 148, 328–339 (2019)CrossRef
21.
Zurück zum Zitat Donmez, T.C., Nigussie, E.: Key management through delegation for LoRaWAN based healthcare monitoring systems. In: 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT), pp. 1–6 (2019) Donmez, T.C., Nigussie, E.: Key management through delegation for LoRaWAN based healthcare monitoring systems. In: 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT), pp. 1–6 (2019)
Metadaten
Titel
Secure LoRaWAN Root Key Update Scheme for IoT Environment
verfasst von
Kun-Lin Tsai
Li-Woei Chen
Fang-Yie Leu
Hsiung-Chieh Hsu
Chuan-Tian Wu
Copyright-Jahr
2022
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-16-9576-6_1

Premium Partner