Abstract
Low-Power Wide Area Networks (LPWANs) represent a category of wireless technologies hailed for their efficiency in facilitating communication for Internet of Things (IoT) applications. This efficacy is attributed to their characteristics of low power consumption, extensive wireless transmission range, and cost-effectiveness. Despite these notable advantages, LPWANs exhibit drawbacks such as limited processing power, modest transmission rates, and notably constrained payload sizes, posing challenges for encryption techniques. The inadequacy of existing cipher-chaining encryption methods for LPWANs is underscored by their dependency on high computing power and payload capacity. To address this issue, this paper introduces an innovative chaining encryption approach tailored for LPWAN IoT technology. The proposed method incorporates a key synchronization mechanism based on deep learning algorithms. The effectiveness of this approach has been rigorously assessed through case studies and experiments. The experimental results demonstrate the commendable performance of the proposed approach: i) The proposed method achieves an average effort of 1.0202 for key synchronization after 10 lost packets, compared to 1.0215 for the best existing method; ii) It attains a 98.45% success rate in key synchronization after 10 lost packets, while the best existing method achieves 98.19%; iii) The proposed approach ensures 98.27% accuracy in receiving messages correctly under conditions of completely random data receipt, compared to 98.22% for the best existing method. These results establish the proposed method as a highly competitive solution among encryption approaches for LPWANs.








Similar content being viewed by others
Data and code availability
The datasets used and analyzed during the current study are available from the corresponding author on reasonable request. The code used during the current study are available from the corresponding author on reasonable request.
References
Ferraris D, Fernandez-Gago C, Roman R, Lopez J (2023) A survey on IoT trust model frameworks. J Supercomput 80(6):8259–8296
Ullah I, Noor A, Nazir S, Ali F, Ghadi YY, Aslam N (2024) Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. J Supercomput 80(5):5870–5899
Inuwa MM, Das R (2024) A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks. Internet of Things (IOT) 26:101162
Sharma S, Verma VK (2021) Security explorations for routing attacks in low power networks on internet of things. J Supercomput 77:4778–4812
Miles B, Bourennane E-B, Boucherkha S, Chikhi S (2020) A study of LoRaWAN protocol performance for IoT applications in smart agriculture. Comput Commun 164:148–157
Morales-García J, Bueno-Crespo A, Martínez-España R, Posadas J-L, Manzoni P, Cecilia JM (2023) Evaluation of low-power devices for smart greenhouse development. J Supercomput 79(9):10277–10299
Gupta S, Snigdh I (2022) Leveraging data aggregation algorithm in Lora networks. J Supercomput 78(15):16861–16875
Shilpa B, Kumar PR, Jha RK (2023) Lora dl: a deep learning model for enhancing the data transmission over Lora using autoencoder. J Supercomput 79(15):17079–17097
Patnaik R, Padhy N, Srujan RK (2021) A systematic survey on IoT security issues, vulnerability and open challenges. In: Intelligent System Design: Proceedings of Intelligent System Design: INDIA 2019, pp. 723–730. Springer
Alizadeh F, Bidgoly AJ (2020) Cipher chaining key re-synchronization in LPWAN IoT network using a deep learning approach. Comput Netw 179:107373
Grammatikis PIR, Sarigiannidis PG, Moscholios ID (2019) Securing the internet of things: challenges, threats and solutions. Internet of Things 5:41–70
Alizadeh F, Bidgoly AJ (2023) Bit flipping attack detection in low power wide area networks using a deep learning approach. Peer-to-Peer Netw Appl 16(4):1916–1926
Ruminot N, Estévez C, Souto VDP, Souza RD, Montejo-Sánchez S (2024) Improving the reliability of lightweight blockchain LPWAN transmission schemes. IEEE Sens J 24(17):28183–28195
Hindumathi G, Bhaskari DL (2022) A secure symmetric key synchronization using session key identifier block algorithm for LPWAN networks. i-Manag J Embed Syst 11(1):1
Mårlind F, Butun I (2020) Activation of LoRaWAN end devices by using public key cryptography. In: 2020 4th Cyber Security in Networking Conference (CSNet), pp. 1–8. IEEE
Abboud S, Abdoun N (2023) Enhancing LoRaWAN security: an advanced AES-based cryptographic approach. IEEE Access 12:2589–2606
Adefemi Alimi KO, Ouahada K, Abu-Mahfouz AM, Rimer S (2020) A survey on the security of low power wide area networks: threats, challenges, and potential solutions. Sensors 20(20):5800
Hatzivasilis G, Fysarakis K, Papaefstathiou I, Manifavas C (2018) A review of lightweight block ciphers. J Cryptogr Eng 8:141–184
Mizikovsky SB, Soler MA (2004) Automatic resynchronization of crypto-sync information. Google Patents. US Patent 6,697,490
Shahid A, Fontaine J, Camelo M, Haxhibeqiri J, Saelens M, Khan Z, Moerman I, De Poorter E (2019) A convolutional neural network approach for classification of LPWAN technologies: Sigfox, Lora and IEEE 802.15. 4g. In: 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pp. 1–8. IEEE
Chaudhari BS, Zennaro M, Borkar S (2020) LPWAN technologies: emerging application characteristics, requirements, and design considerations. Future Internet 12(3):46
Akhavan-Toyserkani K, Beeler M (2014) Method and system for self synchronizing cryptographic parameters. Google Patents. US Patent 8,687,808
Hakeem SAA, El-Kader SMA, Kim H (2021) A key management protocol based on the hash chain key generation for securing LoRaWAN networks. Sensors 21(17):5838
Bidgoly AJ, Bidgoly HJ (2019) A novel chaining encryption algorithm for LPWAN IoT network. IEEE Sens J 19(16):7027–7034
Ma X, Yao T, Hu M, Dong Y, Liu W, Wang F, Liu J (2019) A survey on deep learning empowered IoT applications. IEEE Access 7:181721–181732
Ferdowsi A, Saad W (2018) Deep learning for signal authentication and security in massive internet-of-things systems. IEEE Trans Commun 67(2):1371–1387
Amouri A, Alaparthy VT, Butun I (2023) IDS and IPS in LPWAN (LoRaWAN, Sigfox, and NB-IoT). In: Butun I, Akyildiz IF (eds) Low-power wide-area networks: opportunities, challenges, risks and threats. Springer, Cham, pp 39–82
Boeding M, Hempel M, Sharif H (2024) Novel approach towards a fully deep learning-based IoT receiver architecture: from estimation to decoding. Future Internet 16(5):155
Gao M, Wu L, Li Q, Chen W (2023) Anomaly traffic detection in IoT security using graph neural networks. J Info Secur Appl 76:103532
Awajan A (2023) A novel deep learning-based intrusion detection system for IoT networks. Computers 12(2):34
Rao MR, Sundar S (2023) An efficient method for optimal allocation of resources in LPWAN using hybrid coati-energy valley optimization algorithm based on reinforcement learning. IEEE Access 11:116169–116182
Minhaj SU, Mahmood A, Abedin SF, Hassan SA, Bhatti MT, Ali SH, Gidlund M (2023) Intelligent resource allocation in LoRaWAN using machine learning techniques. IEEE Access 11:10092–10106
Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of ICNN’95-International Conference on Neural Networks 4: 1942–1948. IEEE
Dworkin M (2001) Recommendation for block cipher modes of operation. NIST Sp Publ 800:38
Kim D-Y, Kim S, Park JH (2020) A combined network control approach for the edge cloud and LPWAN-based IoT services. Concurr Comput Practice Exp 32(1):4406
Riley GF, Henderson TR (2010) The ns-3 network simulator. In: Wehrle K, Güneş M, Gross J (eds) Modeling and tools for network simulation. Springer, Berlin, pp 15–34
miracl/miracl. june 2018. available online: https://github.com/miracl/miracl (Accessed 28 July 2021)
ns3-sigfox. apr 28, 2022. available online: https://github.com/deis-tools/ns3-sigfox(Accessed 28 July 2021)
Kuzminykh I, Yevdokymenko M, Sokolov V (2021) Encryption algorithms in IoT: security vs lifetime. Available at SSRN 4636161
Tsai K-L, Leu F-Y, You I, Chang S-W, Hu S-J, Park H (2019) Low-power AES data encryption architecture for a LoRaWAN. IEEE Access 7:146348–146357
Ntshabele K, Isong B, Gasela N, Abu-Mahfouz AM (2022) A comprehensive analysis of LoRaWAN key security models and possible attack solutions. Mathematics 10(19):3421
Funding
The authors did not receive support from any organization for the submitted work.
Author information
Authors and Affiliations
Contributions
Abbas Dehghani developed the theory, performed the simulations, and edited the text. Sadegh Fadaei wrote the main manuscript text, performed the simulations, and verified the analytical methods. Resul Das edited the manuscript and verified the analytical methods.
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dehghani, A., Fadaei, S. & Das, R. A novel effective key synchronization approach based on optimized deep neural networks for IoT-based low-power wide area networks. J Supercomput 81, 6 (2025). https://doi.org/10.1007/s11227-024-06571-2
Accepted:
Published:
DOI: https://doi.org/10.1007/s11227-024-06571-2