Secure LoRaWAN Root Key Update Scheme for IoT Environment

被引:1
|
作者
Tsai, Kun-Lin [1 ]
Chen, Li-Woei [2 ]
Leu, Fang-Yie [3 ]
Hsu, Hsiung-Chieh [1 ]
Wu, Chuan-Tian [1 ]
机构
[1] Tunghai Univ, Dept Elect Engn, Taichung, Taiwan
[2] Chinese Mil Acad, Dept Comp & Informat Sci, Kaohsiung, Taiwan
[3] Tunghai Univ, Dept Comp Sci, Taichung, Taiwan
来源
MOBILE INTERNET SECURITY, MOBISEC 2021 | 2022年 / 1544卷
关键词
LoRaWAN; Root key; Internet of Things; Security; MANAGEMENT;
D O I
10.1007/978-981-16-9576-6_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an essential infrastructure in many fields, such as industry and agriculture. Sensor design, communication scheme, data security, and data analysis are four important topics in the IoT research field. LoRaWAN, one of unlicensed-band based long range wide area network specifications, is very suitable for an IoT system due to the feature of low-power and long-range communication. To enhance the communication security, LoRaWAN encrypts transmitted data with different session keys which are derived from two root keys. However, these root keys stored in the end-device is easily stolen by attackers, thus threatening communication security. In this paper, a root key update scheme is proposed to periodically renew the root keys so that the security level of LoRaWAN can be enhanced. The simulation results by using the Scyther, a security analysis tool, demonstrate that the procedure of the proposed scheme is secure. Besides, the security discussion also shows that the proposed scheme provides the features of mutual authentication, confidentiality and message integrity, and can also resist replay and eavesdropping attacks.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 50 条
  • [1] Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment
    Tsai, Kun-Lin
    Chen, Li-Woei
    Leu, Fang-Yie
    Wu, Chuan-Tian
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 547 - 562
  • [2] A Novel Session Key Update Scheme for LoRaWAN
    Hayati, Nur
    Windarta, Susila
    Suryanegara, Muhammad
    Pranggono, Bernardi
    Ramli, Kalamullah
    IEEE ACCESS, 2022, 10 : 89696 - 89713
  • [3] A Secure and Efficient Blockchain-based Key Management Scheme for LoRaWAN
    Tan, Mingxi
    Sun, Dazhi
    Li, Xiaohong
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [4] Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme
    Qadir, Junaid
    Butun, Ismail
    Gastaldo, Paolo
    Aiello, Orazio
    Caviglia, Daniele D.
    IEEE ACCESS, 2023, 11 : 68301 - 68315
  • [5] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    SYMMETRY-BASEL, 2020, 12 (01):
  • [6] A Lightweight Blockchain Scheme for a Secure Smart Dust IoT Environment
    Park, Joonsuu
    Park, KeeHyun
    APPLIED SCIENCES-BASEL, 2020, 10 (24): : 1 - 18
  • [7] A Secure and LoRaWAN Compatible User Authentication Protocol for Critical Applications in the IoT Environment
    Jabbari, Abdollah
    Mohasefi, Jamshid Bagherzadeh
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) : 56 - 65
  • [8] Secure Session Key Generation Method for LoRaWAN Servers
    Tsai, Kun-Lin
    Leu, Fang-Yie
    Hung, Li-Ling
    Ko, Chia-Yin
    IEEE ACCESS, 2020, 8 (08): : 54631 - 54640
  • [9] A Fast Session Key Generation Scheme for LoRaWAN
    Chen, Xingda
    Wang, Jidong
    Wang, Liuping
    2019 AUSTRALIAN & NEW ZEALAND CONTROL CONFERENCE (ANZCC), 2019, : 63 - 66
  • [10] SDSMS-LoRa: secure dynamic session key management scheme for LoRaWAN v1.1
    Sravan, S. S.
    Mandal, Susmita
    Alphonse, P. J. A.
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (02):