Secure LoRaWAN Root Key Update Scheme for IoT Environment

被引:1
作者
Tsai, Kun-Lin [1 ]
Chen, Li-Woei [2 ]
Leu, Fang-Yie [3 ]
Hsu, Hsiung-Chieh [1 ]
Wu, Chuan-Tian [1 ]
机构
[1] Tunghai Univ, Dept Elect Engn, Taichung, Taiwan
[2] Chinese Mil Acad, Dept Comp & Informat Sci, Kaohsiung, Taiwan
[3] Tunghai Univ, Dept Comp Sci, Taichung, Taiwan
来源
MOBILE INTERNET SECURITY, MOBISEC 2021 | 2022年 / 1544卷
关键词
LoRaWAN; Root key; Internet of Things; Security; MANAGEMENT;
D O I
10.1007/978-981-16-9576-6_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an essential infrastructure in many fields, such as industry and agriculture. Sensor design, communication scheme, data security, and data analysis are four important topics in the IoT research field. LoRaWAN, one of unlicensed-band based long range wide area network specifications, is very suitable for an IoT system due to the feature of low-power and long-range communication. To enhance the communication security, LoRaWAN encrypts transmitted data with different session keys which are derived from two root keys. However, these root keys stored in the end-device is easily stolen by attackers, thus threatening communication security. In this paper, a root key update scheme is proposed to periodically renew the root keys so that the security level of LoRaWAN can be enhanced. The simulation results by using the Scyther, a security analysis tool, demonstrate that the procedure of the proposed scheme is secure. Besides, the security discussion also shows that the proposed scheme provides the features of mutual authentication, confidentiality and message integrity, and can also resist replay and eavesdropping attacks.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 50 条
[31]   A secure authentication scheme for IoT application in smart home [J].
Kumar, Pankaj ;
Chouhan, Lokesh .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) :420-438
[32]   Secure Time Synchronization Scheme in IoT based on Blockchain [J].
Fan, Kai ;
Ren, Yanhui ;
Yan, Zheng ;
Yang, Shangyang ;
Li, Hui ;
Yang, Yintang .
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, :1063-1068
[33]   A Secure Device-to-Device Link Establishment Scheme for LoRaWAN [J].
Kim, Jaehyu ;
Song, JooSeok .
IEEE SENSORS JOURNAL, 2018, 18 (05) :2153-2160
[34]   A secure authentication scheme for IoT application in smart home [J].
Pankaj Kumar ;
Lokesh Chouhan .
Peer-to-Peer Networking and Applications, 2021, 14 :420-438
[35]   Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications [J].
Challa, Sravani ;
Wazid, Mohammad ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Reddy, Alavalapati Goutham ;
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEEE ACCESS, 2017, 5 :3028-3043
[36]   Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters [J].
Chai, Sheng ;
Yin, Haotian ;
Xing, Bin ;
Li, Zhukun ;
Guo, Yunyi ;
Zhang, Di ;
Zhang, Xin ;
He, Da ;
Zhang, Jie ;
Yu, Xiaoling ;
Wang, Wei ;
Huang, Xin .
IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (05) :3816-3827
[37]   Exploration of IoT Nodes Communication Using LoRaWAN in Forest Environment [J].
Sharma, Anshul ;
Kapoor, Divneet Singh ;
Nayyar, Anand ;
Qureshi, Basit ;
Singh, Kiran Jot ;
Thakur, Khushal .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (03) :6239-6256
[38]   A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment [J].
Yu, SungJin ;
Park, KiSung ;
Park, YoungHo .
SENSORS, 2019, 19 (16)
[39]   Optimal Key Management for Secure D2D Communication in IoT Environment [J].
Kumar, Lalit ;
Kumar, Pradeep .
AD HOC & SENSOR WIRELESS NETWORKS, 2024, 58 (1-2) :1-19
[40]   Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment [J].
Marimuthu Karuppiah ;
Ashok Kumar Das ;
Xiong Li ;
Saru Kumari ;
Fan Wu ;
Shehzad Ashraf Chaudhry ;
R. Niranchana .
Mobile Networks and Applications, 2019, 24 :1046-1062