Abstract
With the development of Internet of Things (IoT), various communication protocols are created to support long range, low cost and low power consumption network environment. The LoRaWAN developed by LoRa Alliance is one of them. The LoRa Alliance Technical Committee proposed LoRaWAN specification version 1.1 to detail message communication structure in each network layer and to enhance network security. The network server in LoRaWAN specification version 1.0 is divided into three in version 1.1, i.e., home network server, serving network server, and forwarding network server. However, the security among these three network servers is not specified in LoRaWAN specification. In this paper, a secure session keys establish method, named network Server Session Keys Establish (SSKE) method, is proposed to generate multiple session keys for three different types of network servers so that they can communicate with each other by using these session keys. With the assistance of join server, the key establish process employs the elliptic curve cryptography, two-dimensional operations, and time keys, to exchange their session keys. The SSKE not only effectively hides important encryption parameters, but also achieves fully mutual authentication among three servers. Security analysis shows that the SSKE can resist known-key, impersonation, replay, eavesdropping, and forgery attacks. Moreover, the SSKE generates 40 session keys in a key establish process, meaning the proposed protocol can support 40 sessions simultaneously.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Gaur, A., Scotney, B., Parr, G., McClean, S.: Smart city architecture and its applications based on IoT. Proc. Comput. Sci. 52, 1089–1094 (2015)
Shih, C.-S., Chou, J.-J., Lin, K.-J.: WuKong: Secure Run-Time environment and data-driven IoT applications for Smart Cities and Smart Buildings. J. Internet Serv. Inf. Secur. 8(2), 1–17 (2018)
Chekired, D.A., Khoukhi, L., Mouftah, H.T.: Industrial IoT data scheduling based on hierarchical fog computing: a key for enabling smart factory. IEEE Trans. Industr. Inf. 14(10), 4590–4602 (2018)
Flore, D.: 3GPP Standards for the Internet-of-Things, Recuperado el 25 (2016)
Lora-alliance. https://www.lora-alliance.org. Accessed 15 Aug 2019
Sigfox. https://www.sigfox.com. Accessed 15 Aug 2019
Telensa. http://www.telensa.com. Accessed 15 Aug 2019
Weightless. http://www.weightless.org. Accessed 15 Aug 2019
LoRa Alliance Technical Committee: LoRaWAN Backend Interfaces 1.0 Specification. LoRa Alliance (2017)
LoRa Alliance Technical Committee: LoRaWAN 1.1 Specification. LoRa Alliance (2017)
Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (2001)
Korzhuk, V., Groznykh, A., Menshikov, A., Strecker, M.: Identification of attacks against wireless sensor networks based on behaviour analysis graphics processing units. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. 10(2), 1–21 (2019)
Gritti, C., Önen, M., Molva, R., Susilo, W., Plantard, T.: Device identification and personal data attestation in networks. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. 9(4), 1–25 (2018)
Kotenko, I., Saenko, I., Branitskiy, A.: Applying big data processing and machine learning methods for mobile Internet of Things security monitoring. J. Internet Serv. Inf. Secur. 8(3), 54–63 (2018)
Hui, H., et al.: Survey on blockchain for Internet of Things. J. Internet Serv. Inf. Secur. 9(2), 1–30 (2019)
Butun, I., Pereira, N., Gidlund, M.: Security risk analysis of LoRaWAN and future directions. Fut. Internet 11(1), 1–22 (2019). Article ID 3
Miller R.: LoRa Security – Building a Secure LoRa Solution. MWR Labs, Whitepaper (2016)
You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.: An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18(6), 1–32 (2018). Article ID 1888
Sanchez-Iborra, R., et al.: Enhancing LoRaWAN security through a lightweight and authenticated key management approach. Sensors 18(6), 1–18 (2018). Article ID 1833
Hayati, N., Suryanegara, M., Ramli, K., Suryanto, Y.: Potential development of AES-128-bit key generation for LoRaWAN security. In: International Conference on Communication Engineering and Technology Proceedings, Nagoya, Japan, pp. 57–61 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tsai, KL., Leu, FY., Yang, LC., Li, C., Liu, JY. (2020). LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server. In: You, I., Chen, HC., Leu, FY., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science, vol 1121. Springer, Singapore. https://doi.org/10.1007/978-981-15-9609-4_3
Download citation
DOI: https://doi.org/10.1007/978-981-15-9609-4_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9608-7
Online ISBN: 978-981-15-9609-4
eBook Packages: Computer ScienceComputer Science (R0)