Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability

被引:0
|
作者
Noura, Hassan N. [1 ]
Salman, Ola [1 ]
Chehab, Ali [1 ]
Couturier, Raphael [2 ]
机构
[1] Univ Franche Comte, FEMTO ST Inst, Belfort, France
[2] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 11072020, Lebanon
来源
2022 16TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS, SITIS | 2022年
关键词
IoT; Entity availability attack; Data availability; Information Dispersal Algorithm;
D O I
10.1109/SITIS57111.2022.00016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) is interconnecting a large number of devices, some of which are constrained in terms of power and computational capability. Currently, batterypowered IoT devices are deployed in large areas, calling for power-efficient and long-range communication technologies. In this context, the Low Power Wide Area Networks (LPWAN) are considered key enablers for such IoT systems. LoRaWAN, an LPWAN technology, is one of the dominant candidates for major IoT communication protocols. Unfortunately, LoRaWAN suffers from various security and privacy issues, which may lead to several attacks on a LoRaWAN network targeting data availability, authentication, and confidentiality. In this paper, we present an effective solution to prevent data and system availability attacks at the gateway level, which is considered the weakest link in the LoRaWAN communication system. The proposed solution is intended to make the LoRaWAN communication between end devices and network servers more secure, resilient, and efficient. To ensure data availability while also reinforcing data confidentiality and integrity for LoRaWAN networks, the proposed solution utilizes the Information Dispersal Algorithm (IDA) over GF( 28) with a dynamic key derivation scheme. This solution assumes that several gateways (n) are deployed within a LoRaWAN network. The security and efficiency tests show that the proposed solution exhibits a low overhead in terms of computations, resources, and communication while offering a high degree of availability and confidentiality. Keywords- IoT; Entity availability attack; Data
引用
收藏
页码:45 / 52
页数:8
相关论文
共 50 条
  • [41] A data security scheme based on EEG characteristics for body area networks
    Bai, Tong
    Jiang, Yuhao
    Yang, Jiazhang
    Luo, Jiasai
    Du, Ya
    FRONTIERS IN NEUROSCIENCE, 2023, 17
  • [42] Usage Control based Security Access Scheme for Wireless Sensor Networks
    Wu, Jun
    Shimamoto, Shigeru
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS - ICC 2010, 2010,
  • [43] Security management in wireless sensor networks with a public key based scheme
    Pathan, Al-Sakib Khan
    Ryu, Jae Hyun
    Haque, Md. Mokammel
    Hong, Choong Seon
    MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 503 - +
  • [44] Fast and Efficient Security Scheme for Blockchain-Based IoT Networks
    Fasila, K. A.
    Mathew, Sheena
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 2097 - 2114
  • [45] Mobility Based Key Management Security Scheme for Wireless Sensor Networks
    Lalitha, T.
    Jayaprabha, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (02) : 349 - 367
  • [46] A Security Detection Scheme Based on Evidence Nodes in Wireless Sensor Networks
    Feng, Xin
    Ding, Xin
    Sun, Supeng
    PROCEEDINGS OF THE 2013 6TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI 2013), VOLS 1 AND 2, 2013, : 689 - 693
  • [47] Developing a group-based security scheme for wireless sensor networks
    Hamid, Md. Abdul
    Rahman, Md. Mustafizur
    Yoon, Young Jig
    Hong, Choong Seon
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1354 - 1359
  • [48] A Novel Identity-based Security Scheme for Wireless Sensor Networks
    Qin, Zhongyuan
    Feng, Kerong
    Hu, Shuaiqi
    Tao, Lei
    Hu, Zunli
    Zhang, Xinshuai
    Huang, Jie
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 662 - 666
  • [49] Trigger based security alarming scheme for moving objects on road networks
    Abraham, Sajimon
    Lal, P. Sojan
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2008, 5075 : 92 - +
  • [50] Trigger based security alarming scheme for moving objects on road networks
    Abraham, Sajimon
    Sojan Lal, P.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2008, 5075 : 92 - 101