Enhancing LoRaWAN Security: An Advanced AES-Based Cryptographic Approach

被引:5
作者
Abboud, Samira [1 ]
Abdoun, Nabil [2 ]
机构
[1] Ecole Super Elect Ouest ESEO, F-49107 Angers, France
[2] Lebanese Amer Univ LAU, Sch Arts & Sci, Dept Liberal Educ, Beirut 11022801, Lebanon
关键词
LoRa; LoRaWAN; cryptography; AES; throughput; energy consumption; COMMUNICATION;
D O I
10.1109/ACCESS.2023.3348416
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unique set of LoRaWAN design prerequisites, which include low power consumption, cost-effectiveness, and high scalability, requires its security protocols to be equally robust and enduring, especially since devices are often deployed for extended durations in the field. This research paper elucidates a novel cryptographic method for LoRaWAN, hinged on the Advanced Encryption Standard (AES) employing a 256-bit key. The efficacy and efficiency of the proposed cryptographic solution are analyzed through a comprehensive performance evaluation. Key performance indicators include the security metric, network throughput, and energy utilization of end-devices. It was observed that augmenting the key size from 128 to 256 bits notably bolsters the resilience of LoRaWAN against various cyber attacks. The results also indicate a marginal disparity between the proposed AES256-based method and the existing AES128-based method with regards to network throughput and energy consumption. However, the enhanced security provided by the AES256 standard underscores its potential as a viable cryptographic method for LoRaWAN, providing a favorable balance between improved security and operational performance.
引用
收藏
页码:2589 / 2606
页数:18
相关论文
共 85 条
[1]  
Abboud S., 2020, PROC IEEE 91 VEH TEC, P1
[2]   Gateway Selection for Downlink Communication in LoRaWAN [J].
Abboud, Samira ;
El Rachkidy, Nancy ;
Guitton, Alexandre ;
Safa, Haidar .
2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
[3]  
Abdoun N., 2023, Advances and Challenges in Science and Technology, V6, P146
[4]   Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction [J].
Abdoun, Nabil ;
El Assad, Safwan ;
Manh Hoang, Thang ;
Deforges, Olivier ;
Assaf, Rima ;
Khalil, Mohamad .
SYMMETRY-BASEL, 2021, 13 (12)
[5]   Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network [J].
Abdoun, Nabil ;
El Assad, Safwan ;
Thang Manh Hoang ;
Deforges, Olivier ;
Assaf, Rima ;
Khalil, Mohamad .
ENTROPY, 2020, 22 (09)
[6]   Performance Evaluation of LoRaWAN for Green Internet of Things [J].
Ali, Zulfiqar ;
Henna, Shagufta ;
Akhunzada, Adnan ;
Raza, Mohsin ;
Kim, Sung Won .
IEEE ACCESS, 2019, 7 :164102-164112
[7]   LoRa-PUF: A Two-Step Security Solution for LoRaWAN [J].
Aliyu, Mohammed Bello ;
Hafeez, Maryam ;
Johnson, Anju .
2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,
[8]  
Anantachaisilp P., 2020, Store and forward CubeSat using LoRa technology and private LoRaWAN-Server
[9]  
[Anonymous], Platform for IoT
[10]  
[Anonymous], LoRaWAN 1.0.3 Specification