A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis

被引:4
作者
Ntshabele, Koketso [1 ]
Isong, Bassey [1 ]
Gasela, Naison [1 ]
Abu-Mahfouz, Adnan M. [2 ]
机构
[1] North West Univ, Comp Sci Dept, ZA-2745 Mafikeng, South Africa
[2] Council Sci & Ind Res CSIR, ZA-0001 Pretoria, South Africa
关键词
IoT; LoRa; LoRaWAN; attacks; key security; security model; symmetric encryption;
D O I
10.3390/jsan11030052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally accepted and resilient LoRaWAN security model is challenging. Although several security models to maximize the security efficiency in LoRaWAN exist using the trusted key server to securely manage the keys, designing an optimum LoRaWAN security model is yet to be fully realized. Therefore, in this paper, we proposed two LoRaWAN security algorithms, A and B, for a trusted key management server (TKMS) to securely manage and distribute the keys amongst the entities. Algorithm B is an enhanced version of Algorithm A, which utilizes the security shortcomings of Algorithm A. We employed two formal analysis methods in the modelling, results analysis, and verification. The Scyther security verification tool was used for algorithm modelling and analysis against all possible attacks, while BAN logic was used to prove the logical correctness of the proposed algorithms. The results indicate that BAN logic feasibly proves the model logic correctness and the security claims employed in Scyther are reliable metrics for assessing the algorithms' security efficiency. The security claims proved that the security algorithm is more secure and reliable as no attacks were detected across all entities in the enhanced-Algorithm B, unlike in Algorithm A. Moreover, the application of hashing minimizes computation cost and time for authentication and message integrity as compared to symmetric and asymmetric encryption. However, the proposed algorithm is yet to be verified as completely lightweight.
引用
收藏
页数:23
相关论文
共 26 条
[1]   Upgrading the S-NCI Key Establishment Protocol Scheme to be Secure and Applicable [J].
Budiyanto, Setiyo ;
Santosa, Galih Bangun ;
Mariati, Fajar Rahayu Ikhwannul .
INTERNATIONAL CONFERENCE ON DESIGN, ENGINEERING AND COMPUTER SCIENCES, 2018, 453
[2]  
Choi J, 2016, ASIAPAC SIGN INFO PR
[3]  
Cremers C. J. F., 2006, SCYTHER SEMANTICS VE
[4]  
Dalai Nitish, 2010, International Journal of Communications, Networks and System Sciences, V3, P779, DOI 10.4236/ijcns.2010.310104
[5]   Lightweight Cryptography: A Solution to Secure IoT [J].
Dhanda, Sumit Singh ;
Singh, Brahmjit ;
Jindal, Poonam .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (03) :1947-1980
[6]  
Hamza Aljaafari, 2020, Proceedings of the 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), P333, DOI 10.1109/SMART50582.2020.9336800
[7]   An Enhanced Key Management Scheme for LoRaWAN [J].
Han, Jialuo ;
Wang, Jidong .
CRYPTOGRAPHY, 2018, 2 (04) :1-12
[8]  
Hu Z., 2021, Layered network protocols for secure communications in the internet of things
[9]   A Dual Key-Based Activation Scheme for Secure LoRaWAN [J].
Kim, Jaehyu ;
Song, JooSeok .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017,
[10]  
Lee J, 2017, 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P549, DOI 10.1109/ICOIN.2017.7899554