Skip to main content

Advertisement

Log in

A novel effective key synchronization approach based on optimized deep neural networks for IoT-based low-power wide area networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Low-Power Wide Area Networks (LPWANs) represent a category of wireless technologies hailed for their efficiency in facilitating communication for Internet of Things (IoT) applications. This efficacy is attributed to their characteristics of low power consumption, extensive wireless transmission range, and cost-effectiveness. Despite these notable advantages, LPWANs exhibit drawbacks such as limited processing power, modest transmission rates, and notably constrained payload sizes, posing challenges for encryption techniques. The inadequacy of existing cipher-chaining encryption methods for LPWANs is underscored by their dependency on high computing power and payload capacity. To address this issue, this paper introduces an innovative chaining encryption approach tailored for LPWAN IoT technology. The proposed method incorporates a key synchronization mechanism based on deep learning algorithms. The effectiveness of this approach has been rigorously assessed through case studies and experiments. The experimental results demonstrate the commendable performance of the proposed approach: i) The proposed method achieves an average effort of 1.0202 for key synchronization after 10 lost packets, compared to 1.0215 for the best existing method; ii) It attains a 98.45% success rate in key synchronization after 10 lost packets, while the best existing method achieves 98.19%; iii) The proposed approach ensures 98.27% accuracy in receiving messages correctly under conditions of completely random data receipt, compared to 98.22% for the best existing method. These results establish the proposed method as a highly competitive solution among encryption approaches for LPWANs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data and code availability

The datasets used and analyzed during the current study are available from the corresponding author on reasonable request. The code used during the current study are available from the corresponding author on reasonable request.

References

  1. Ferraris D, Fernandez-Gago C, Roman R, Lopez J (2023) A survey on IoT trust model frameworks. J Supercomput 80(6):8259–8296

    Article  Google Scholar 

  2. Ullah I, Noor A, Nazir S, Ali F, Ghadi YY, Aslam N (2024) Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. J Supercomput 80(5):5870–5899

    Article  Google Scholar 

  3. Inuwa MM, Das R (2024) A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks. Internet of Things (IOT) 26:101162

    Article  Google Scholar 

  4. Sharma S, Verma VK (2021) Security explorations for routing attacks in low power networks on internet of things. J Supercomput 77:4778–4812

    Article  Google Scholar 

  5. Miles B, Bourennane E-B, Boucherkha S, Chikhi S (2020) A study of LoRaWAN protocol performance for IoT applications in smart agriculture. Comput Commun 164:148–157

    Article  Google Scholar 

  6. Morales-García J, Bueno-Crespo A, Martínez-España R, Posadas J-L, Manzoni P, Cecilia JM (2023) Evaluation of low-power devices for smart greenhouse development. J Supercomput 79(9):10277–10299

    Article  Google Scholar 

  7. Gupta S, Snigdh I (2022) Leveraging data aggregation algorithm in Lora networks. J Supercomput 78(15):16861–16875

    Article  Google Scholar 

  8. Shilpa B, Kumar PR, Jha RK (2023) Lora dl: a deep learning model for enhancing the data transmission over Lora using autoencoder. J Supercomput 79(15):17079–17097

    Article  Google Scholar 

  9. Patnaik R, Padhy N, Srujan RK (2021) A systematic survey on IoT security issues, vulnerability and open challenges. In: Intelligent System Design: Proceedings of Intelligent System Design: INDIA 2019, pp. 723–730. Springer

  10. Alizadeh F, Bidgoly AJ (2020) Cipher chaining key re-synchronization in LPWAN IoT network using a deep learning approach. Comput Netw 179:107373

    Article  Google Scholar 

  11. Grammatikis PIR, Sarigiannidis PG, Moscholios ID (2019) Securing the internet of things: challenges, threats and solutions. Internet of Things 5:41–70

    Article  Google Scholar 

  12. Alizadeh F, Bidgoly AJ (2023) Bit flipping attack detection in low power wide area networks using a deep learning approach. Peer-to-Peer Netw Appl 16(4):1916–1926

    Article  Google Scholar 

  13. Ruminot N, Estévez C, Souto VDP, Souza RD, Montejo-Sánchez S (2024) Improving the reliability of lightweight blockchain LPWAN transmission schemes. IEEE Sens J 24(17):28183–28195

    Article  Google Scholar 

  14. Hindumathi G, Bhaskari DL (2022) A secure symmetric key synchronization using session key identifier block algorithm for LPWAN networks. i-Manag J Embed Syst 11(1):1

    Google Scholar 

  15. Mårlind F, Butun I (2020) Activation of LoRaWAN end devices by using public key cryptography. In: 2020 4th Cyber Security in Networking Conference (CSNet), pp. 1–8. IEEE

  16. Abboud S, Abdoun N (2023) Enhancing LoRaWAN security: an advanced AES-based cryptographic approach. IEEE Access 12:2589–2606

    Article  Google Scholar 

  17. Adefemi Alimi KO, Ouahada K, Abu-Mahfouz AM, Rimer S (2020) A survey on the security of low power wide area networks: threats, challenges, and potential solutions. Sensors 20(20):5800

    Article  Google Scholar 

  18. Hatzivasilis G, Fysarakis K, Papaefstathiou I, Manifavas C (2018) A review of lightweight block ciphers. J Cryptogr Eng 8:141–184

    Article  Google Scholar 

  19. Mizikovsky SB, Soler MA (2004) Automatic resynchronization of crypto-sync information. Google Patents. US Patent 6,697,490

  20. Shahid A, Fontaine J, Camelo M, Haxhibeqiri J, Saelens M, Khan Z, Moerman I, De Poorter E (2019) A convolutional neural network approach for classification of LPWAN technologies: Sigfox, Lora and IEEE 802.15. 4g. In: 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1–8. IEEE

  21. Chaudhari BS, Zennaro M, Borkar S (2020) LPWAN technologies: emerging application characteristics, requirements, and design considerations. Future Internet 12(3):46

    Article  Google Scholar 

  22. Akhavan-Toyserkani K, Beeler M (2014) Method and system for self synchronizing cryptographic parameters. Google Patents. US Patent 8,687,808

  23. Hakeem SAA, El-Kader SMA, Kim H (2021) A key management protocol based on the hash chain key generation for securing LoRaWAN networks. Sensors 21(17):5838

    Article  Google Scholar 

  24. Bidgoly AJ, Bidgoly HJ (2019) A novel chaining encryption algorithm for LPWAN IoT network. IEEE Sens J 19(16):7027–7034

    Article  Google Scholar 

  25. Ma X, Yao T, Hu M, Dong Y, Liu W, Wang F, Liu J (2019) A survey on deep learning empowered IoT applications. IEEE Access 7:181721–181732

    Article  Google Scholar 

  26. Ferdowsi A, Saad W (2018) Deep learning for signal authentication and security in massive internet-of-things systems. IEEE Trans Commun 67(2):1371–1387

    Article  Google Scholar 

  27. Amouri A, Alaparthy VT, Butun I (2023) IDS and IPS in LPWAN (LoRaWAN, Sigfox, and NB-IoT). In: Butun I, Akyildiz IF (eds) Low-power wide-area networks: opportunities, challenges, risks and threats. Springer, Cham, pp 39–82

    Chapter  Google Scholar 

  28. Boeding M, Hempel M, Sharif H (2024) Novel approach towards a fully deep learning-based IoT receiver architecture: from estimation to decoding. Future Internet 16(5):155

    Article  Google Scholar 

  29. Gao M, Wu L, Li Q, Chen W (2023) Anomaly traffic detection in IoT security using graph neural networks. J Info Secur Appl 76:103532

    Google Scholar 

  30. Awajan A (2023) A novel deep learning-based intrusion detection system for IoT networks. Computers 12(2):34

    Article  Google Scholar 

  31. Rao MR, Sundar S (2023) An efficient method for optimal allocation of resources in LPWAN using hybrid coati-energy valley optimization algorithm based on reinforcement learning. IEEE Access 11:116169–116182

    Article  Google Scholar 

  32. Minhaj SU, Mahmood A, Abedin SF, Hassan SA, Bhatti MT, Ali SH, Gidlund M (2023) Intelligent resource allocation in LoRaWAN using machine learning techniques. IEEE Access 11:10092–10106

    Article  Google Scholar 

  33. Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of ICNN’95-International Conference on Neural Networks 4: 1942–1948. IEEE

  34. Dworkin M (2001) Recommendation for block cipher modes of operation. NIST Sp Publ 800:38

    Google Scholar 

  35. Kim D-Y, Kim S, Park JH (2020) A combined network control approach for the edge cloud and LPWAN-based IoT services. Concurr Comput Practice Exp 32(1):4406

    Article  Google Scholar 

  36. Riley GF, Henderson TR (2010) The ns-3 network simulator. In: Wehrle K, Güneş M, Gross J (eds) Modeling and tools for network simulation. Springer, Berlin, pp 15–34

    Chapter  Google Scholar 

  37. miracl/miracl. june 2018. available online: https://github.com/miracl/miracl (Accessed 28 July 2021)

  38. ns3-sigfox. apr 28, 2022. available online: https://github.com/deis-tools/ns3-sigfox(Accessed 28 July 2021)

  39. Kuzminykh I, Yevdokymenko M, Sokolov V (2021) Encryption algorithms in IoT: security vs lifetime. Available at SSRN 4636161

  40. Tsai K-L, Leu F-Y, You I, Chang S-W, Hu S-J, Park H (2019) Low-power AES data encryption architecture for a LoRaWAN. IEEE Access 7:146348–146357

    Article  Google Scholar 

  41. Ntshabele K, Isong B, Gasela N, Abu-Mahfouz AM (2022) A comprehensive analysis of LoRaWAN key security models and possible attack solutions. Mathematics 10(19):3421

    Article  Google Scholar 

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

Abbas Dehghani developed the theory, performed the simulations, and edited the text. Sadegh Fadaei wrote the main manuscript text, performed the simulations, and verified the analytical methods. Resul Das edited the manuscript and verified the analytical methods.

Corresponding authors

Correspondence to Abbas Dehghani or Sadegh Fadaei.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dehghani, A., Fadaei, S. & Das, R. A novel effective key synchronization approach based on optimized deep neural networks for IoT-based low-power wide area networks. J Supercomput 81, 6 (2025). https://doi.org/10.1007/s11227-024-06571-2

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-024-06571-2

Keywords