Potential Development of AES 128-bit Key Generation for LoRaWAN Security

被引:0
作者
Hayati, Nur [1 ]
Suryanegara, Muhammad [1 ]
Ramli, Kalamullah [1 ]
Suryanto, Yohan [1 ]
机构
[1] Univ Indonesia, Dept Elect Engn, Depok, Indonesia
来源
PROCEEDINGS OF 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY (ICCET 2019) | 2019年
关键词
key generation; symmetric encryption; AES; IoT security; LoRaWAN; COMMUNICATION;
D O I
10.1109/iccet.2019.8726884
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This research aims to simulate and analyze a potential parameter of developing the key generation used for encryption in LoRaWAN. Key generation or key scheduling is an important part of the encryption process because in modern security, encryption algorithm will be shared widely so that it can be developed according to standards, and its strength tested, but the cipher key will remain hidden. In the LoRaWAN network, key generation is part of Advanced Encryption Standard (AES) encryption embedded in the NwkSKey and the AppSKey. Our research provides baseline information that has the potential to develop the key-generation algorithm used in LoRaWAN. We conduct simulations for gathering field data and then discuss three parameters related to the technical development of key generation: processing time, randomness level and key length. Meanwhile for LoRaWAN, there are two additional parameters that need to be considered: computation resources and battery durability.
引用
收藏
页码:57 / 61
页数:5
相关论文
共 17 条
  • [1] A'ssri SA, 2017, 2017 IEEE 8TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC), P127, DOI 10.1109/ICSGRC.2017.8070581
  • [2] [Anonymous], TECHNICAL OVERVIEW L
  • [3] [Anonymous], PRECISION LIVESTOCK
  • [4] [Anonymous], 2017, INT J ENG ADV TECHNO
  • [5] [Anonymous], 2012, ADV INTERNET THINGS, DOI DOI 10.4236/AIT.2012.21001
  • [6] [Anonymous], 2005, RANDOMNESS REQUIREME
  • [7] Aras E., 2017, 2017 3 IEEE INT C CY, P1, DOI [10.1109/CYBConf.2017.7985777, DOI 10.1109/CYBCONF.2017.7985777]
  • [8] Dabbagh M, 2017, Internet of Things Security and Privacy in Internet of Things From Hype to Reality, P195, DOI 10.1007/978-3-319-44860-2
  • [9] Speeding Up the Internet of Things LEAIoT: A lightweight encryption algorithm toward low-latency communication for the Internet of Things
    Habib, Muhammad Asif
    Ahmad, Mudassar
    Jabbar, Sohail
    Ahmed, Syed Hassan
    Rodrigues, Joel J. P. C.
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2018, 7 (06) : 31 - 37
  • [10] Hayati N, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), P135, DOI 10.1109/COMNETSAT.2017.8263587