Secure LoRaWAN Root Key Update Scheme for IoT Environment

被引:1
|
作者
Tsai, Kun-Lin [1 ]
Chen, Li-Woei [2 ]
Leu, Fang-Yie [3 ]
Hsu, Hsiung-Chieh [1 ]
Wu, Chuan-Tian [1 ]
机构
[1] Tunghai Univ, Dept Elect Engn, Taichung, Taiwan
[2] Chinese Mil Acad, Dept Comp & Informat Sci, Kaohsiung, Taiwan
[3] Tunghai Univ, Dept Comp Sci, Taichung, Taiwan
来源
关键词
LoRaWAN; Root key; Internet of Things; Security; MANAGEMENT;
D O I
10.1007/978-981-16-9576-6_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an essential infrastructure in many fields, such as industry and agriculture. Sensor design, communication scheme, data security, and data analysis are four important topics in the IoT research field. LoRaWAN, one of unlicensed-band based long range wide area network specifications, is very suitable for an IoT system due to the feature of low-power and long-range communication. To enhance the communication security, LoRaWAN encrypts transmitted data with different session keys which are derived from two root keys. However, these root keys stored in the end-device is easily stolen by attackers, thus threatening communication security. In this paper, a root key update scheme is proposed to periodically renew the root keys so that the security level of LoRaWAN can be enhanced. The simulation results by using the Scyther, a security analysis tool, demonstrate that the procedure of the proposed scheme is secure. Besides, the security discussion also shows that the proposed scheme provides the features of mutual authentication, confidentiality and message integrity, and can also resist replay and eavesdropping attacks.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 50 条
  • [1] Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment
    Tsai, Kun-Lin
    Chen, Li-Woei
    Leu, Fang-Yie
    Wu, Chuan-Tian
    Computers, Materials and Continua, 2022, 73 (01): : 547 - 562
  • [2] Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment
    Tsai, Kun-Lin
    Chen, Li-Woei
    Leu, Fang-Yie
    Wu, Chuan-Tian
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 547 - 562
  • [3] A Novel Session Key Update Scheme for LoRaWAN
    Hayati, Nur
    Windarta, Susila
    Suryanegara, Muhammad
    Pranggono, Bernardi
    Ramli, Kalamullah
    IEEE ACCESS, 2022, 10 : 89696 - 89713
  • [4] A Dual Key-Based Activation Scheme for Secure LoRaWAN
    Kim, Jaehyu
    Song, JooSeok
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
  • [5] A Secure and Efficient Blockchain-based Key Management Scheme for LoRaWAN
    Tan, Mingxi
    Sun, Dazhi
    Li, Xiaohong
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [6] Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks
    Naidu, Devishree
    Ray, Niranjan K.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (27):
  • [7] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    SYMMETRY-BASEL, 2020, 12 (01):
  • [8] Secure Key Update Scheme for Smart Meters
    Hsiao, Chun-Yuan
    Chen, Wei-Jheng
    2016 3RD INTERNATIONAL CONFERENCE ON GREEN TECHNOLOGY AND SUSTAINABLE DEVELOPMENT (GTSD), 2016, : 170 - 170
  • [9] A Secure and LoRaWAN Compatible User Authentication Protocol for Critical Applications in the IoT Environment
    Jabbari, Abdollah
    Mohasefi, Jamshid Bagherzadeh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) : 56 - 65
  • [10] Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme
    Qadir, Junaid
    Butun, Ismail
    Gastaldo, Paolo
    Aiello, Orazio
    Caviglia, Daniele D.
    IEEE ACCESS, 2023, 11 : 68301 - 68315