A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators

被引:0
|
作者
Puckett, Steven [1 ,2 ]
Liu, Jianqing [3 ]
Yoo, Seong-Moo [1 ]
Morris, Thomas H. [1 ]
机构
[1] Univ Alabama, Dept Elect & Comp Engn, 35899USA, Huntsville, ON, Canada
[2] Univ North Alabama, Dept Management & Mkt, Florence, AL 35632 USA
[3] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27606 USA
基金
美国国家科学基金会;
关键词
Cryptographic hardware acceleration; elliptic curve cryptography; encryption; energy efficiency; long range (LoRa); long-range wide-area network (LoRaWAN);
D O I
10.1109/JIOT.2023.3304175
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Long-range wide-area network (LoRaWAN) is a low-power wide-area network (LP-WAN) protocol developed for low-bandwidth, battery-operated long-range sensors. However, the LoRaWAN specification has several security issues and utilizes software cryptography, which is not energy efficient. Our proposed solution combines a modified LoRaWAN protocol with a hardware-based cryptographic coprocessor that includes secure on-chip key storage for encryption, decryption, and digital signature creation. This design reduces the energy utilization of the wireless nodes while addressing several of the LoRaWAN threat surfaces. This article provides a security analysis of the reduced threat surfaces and demonstrates the improved energy efficiency of the LoRaWAN nodes with the integrated solution.
引用
收藏
页码:22143 / 22152
页数:10
相关论文
共 50 条
  • [1] Software/hardware co-design of efficient and secure cryptographic hardware
    Nedjah, N
    Mourelle, LD
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2005, 11 (01) : 66 - 82
  • [2] A secure and efficient payment protocol based on ElGamal cryptographic algorithms
    Popescu, Constantin
    [J]. ELECTRONIC COMMERCE RESEARCH, 2018, 18 (02) : 339 - 358
  • [3] A secure and efficient payment protocol based on ElGamal cryptographic algorithms
    Constantin Popescu
    [J]. Electronic Commerce Research, 2018, 18 : 339 - 358
  • [4] Secure Device to Device Communications using Lightweight Cryptographic Protocol
    Kumar, V. Ajith
    Reddy, K. Satyanarayan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (11): : 354 - 362
  • [5] Secure Management of Biomedical Data With Cryptographic Hardware
    Canim, Mustafa
    Kantarcioglu, Murat
    Malin, Bradley
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (01): : 166 - 175
  • [6] Efficient Cryptographic Protocol Design for Secure Sharing of Personal Health Records in the Cloud
    Sukte, Chudaman Devidasrao
    Mark, Emmanuel
    Deshmukh, Ratnadeep R.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2022, 15 (01)
  • [7] A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles
    Baee, Mir Ali Rezazadeh
    Simpson, Leonie
    Boyen, Xavier
    Foo, Ernest
    Pieprzyk, Josef
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 4066 - 4083
  • [8] On the Hardware-Software Integration in Cryptographic Accelerators for Industrial IoT
    Leonardi, Luigi
    Lettieri, Giuseppe
    Perazzo, Pericle
    Saponara, Sergio
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [9] Efficient cryptographic hardware using the co-design methodology
    Mourelle, LD
    Nedjah, N
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 508 - 512
  • [10] Optimized Threshold Implementations: Minimizing the Latency of Secure Cryptographic Accelerators
    Bozilov, Dusan
    Knezevic, Miroslav
    Nikov, Ventzislav
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 20 - 39