A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators

被引:0
|
作者
Puckett, Steven [1 ,2 ]
Liu, Jianqing [3 ]
Yoo, Seong-Moo [1 ]
Morris, Thomas H. [1 ]
机构
[1] Univ Alabama, Dept Elect & Comp Engn, 35899USA, Huntsville, ON, Canada
[2] Univ North Alabama, Dept Management & Mkt, Florence, AL 35632 USA
[3] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27606 USA
基金
美国国家科学基金会;
关键词
Cryptographic hardware acceleration; elliptic curve cryptography; encryption; energy efficiency; long range (LoRa); long-range wide-area network (LoRaWAN);
D O I
10.1109/JIOT.2023.3304175
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Long-range wide-area network (LoRaWAN) is a low-power wide-area network (LP-WAN) protocol developed for low-bandwidth, battery-operated long-range sensors. However, the LoRaWAN specification has several security issues and utilizes software cryptography, which is not energy efficient. Our proposed solution combines a modified LoRaWAN protocol with a hardware-based cryptographic coprocessor that includes secure on-chip key storage for encryption, decryption, and digital signature creation. This design reduces the energy utilization of the wireless nodes while addressing several of the LoRaWAN threat surfaces. This article provides a security analysis of the reduced threat surfaces and demonstrates the improved energy efficiency of the LoRaWAN nodes with the integrated solution.
引用
下载
收藏
页码:22143 / 22152
页数:10
相关论文
共 50 条
  • [21] Efficient Padding Oracle Attacks on Cryptographic Hardware
    Bardou, Romain
    Focardi, Riccardo
    Kawamoto, Yusuke
    Simionato, Lorenzo
    Steel, Graham
    Tsay, Joe-Kai
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 608 - 625
  • [22] A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol
    Idrissi, Hind
    Ennahbaoui, Mohammed
    El Hajji, Said
    Souidi, El Mamoun
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 365 - 382
  • [23] Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications
    El Hadj Youssef, Wajih
    Abdelli, Ali
    Dridi, Fethi
    Machhout, Mohsen
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [24] A Cryptographic Keys Transfer Protocol for Secure Communicating Systems
    Atighehchi, Kevin
    Muntean, Traian
    Parlanti, Sylvain
    Rolland, Robert
    Vallet, Laurent
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 339 - 343
  • [25] Cryptographic Analysis of the Bluetooth Secure Connection Protocol Suite
    Fischlin, Marc
    Sanina, Olga
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 : 696 - 725
  • [26] Formal Verification of Cryptographic Protocol for Secure RFID System
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Kim, Ju-Bae
    Jeong, Yeon-Oh
    Choi, Jin-Young
    NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 470 - 477
  • [27] A SECURE DYNAMIC CRYPTOGRAPHIC AND ENCRYPTION PROTOCOL FOR WIRELESS NETWORKS
    Yu, Peter H.
    Pooch, Udo W.
    EUROCON 2009: INTERNATIONAL IEEE CONFERENCE DEVOTED TO THE 150 ANNIVERSARY OF ALEXANDER S. POPOV, VOLS 1- 4, PROCEEDINGS, 2009, : 1860 - 1865
  • [28] Comments on "A Quantum Cryptographic Protocol for Secure Vehicular Communication"
    Shi, Run-Hua
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, : 21796 - 21798
  • [29] GuardiaNN: Fast and Secure On-Device Inference in TrustZone Using Embedded SRAM and Cryptographic Hardware
    Choi, Jinwoo
    Kim, Jaeyeon
    Lim, Chaemin
    Lee, Suhyun
    Lee, Jinho
    Song, Dokyung
    Kim, Youngsok
    PROCEEDINGS OF THE TWENTY-THIRD ACM/IFIP INTERNATIONAL MIDDLEWARE CONFERENCE, MIDDLEWARE 2022, 2022, : 15 - 28
  • [30] Cost-efficient SHA hardware accelerators
    Chaves, Ricardo
    Kuzmanov, Georgi
    Sousa, Leonel
    Vassiliadis, Starnatis
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2008, 16 (08) : 999 - 1008