Skip to main content
Log in

Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

A smart home interconnects every object of our living space to the Internet. Based on various technologies and standards, many device suppliers propound an expanded range of devices, that are incorporated in the home environment, in order to ease the human’s life and everyday duties. Among the most promising smart home applications, we distinguish the remote services control, that requires a secure and long range communication. LoRaWAN is considered as a rising technology providing a long range and secure communication. However, some LoRaWAN security vulnerabilities have been identified in the literature. So, in this paper, we propose a novel enhanced LoRaWAN solution that we adapt to secure the smart home remote control. The security of the proposed scheme is proved using a rigorous informal security analysis and a formal security verification via Scyther tool. Also, a performance comparison proved that the proposed scheme attains both computation and communication efficiency as compared to other schemes from literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Batalla, J. M., Vasilakos, A., & Gajewski, M. (2017). Secure smart homes: Opportunities and challenges. ACM Computing Surveys (CSUR), 50(5), 75.

    Article  Google Scholar 

  2. Naoui, S., Elhdhili, M. E., & Saidane, L. A. (2017). Lightweight enhanced collaborative key management scheme for smart home application. In 2017 International conference on high performance computing and simulation (HPCS). IEEE.

  3. Lee, C., et al. (2014). Securing smart home: Technologies, security challenges, and security requirements. In 2014 IEEE conference on communications and network security (CNS). IEEE.

  4. Santoso, F. K., & Vun, N. C. H. (2015). Securing IoT for smart home system. In 2015 IEEE international symposium on consumer electronics (ISCE). IEEE.

  5. Aras, E., et al. (2017). Selective jamming of LoRaWAN using commodity hardware. arXiv preprint arXiv:1712.02141.

  6. Sinha, R. S., Wei, Y., & Hwang, S.-H. (2017). A survey on LPWA technology: LoRa and NB-IoT. ICT Express, 3(1), 14–21.

    Article  Google Scholar 

  7. Dhillon, S. H., Huang, H., & Viswanathan, H. (2017). Wide-area wireless communication challenges for the Internet of Things. IEEE Communications Magazine, 55(2), 168–174.

    Article  Google Scholar 

  8. Sanchez-Iborra, R., & Cano, M.-D. (2016). State of the art in LP-WAN solutions for industrial IoT services. Sensors, 16(5), 708.

    Article  Google Scholar 

  9. Alliance, L. (2016). LoRaWAN specification (V1. 0.2). [2017-06-10]. https://www.lora-alliance.org/Contact.

  10. Ingenu, C. E. O. (2016). Explains why he’s rebranding on-ramp and what it will mean for IoT users. [2016-12-07]. http://www.IoT-now.com/2015/09/14/36799-ingenuceo-explains-why-hes-rebranding-on-ramp-and-whatingenu-will-mean-for-IoT-users.

  11. de Carvalho Silva, J., et al. (2017). LoRaWAN—A low power WAN protocol for Internet of Things: A review and opportunities. In 2017 2nd International multidisciplinary conference on computer and energy science (SpliTech). IEEE.

  12. Augustin, A. (2016). A study of LoRa: Long range and low power networks for the internet of things. Sensors, 16(9), 1466.

    Article  Google Scholar 

  13. Yu, F., Zhu, Z., & Fan, Z. (2017). Study on the feasibility of LoRaWAN for smart city applications. In 2017 IEEE 13th International conference on wireless and mobile computing, networking and communications (WiMob). IEEE.

  14. Naoui, S., Elhdhili, M.E., & Saidane, L.A. (2016). Enhancing the security of the IoT LoraWAN architecture. In International conference on performance evaluation and modeling in wired and wireless networks (PEMWN). IEEE.

  15. Yang, X. (2017). LoRaWAN: Vulnerability analysis and practical exploitation. Delft University of Technology. URL: https://repository.tudelft.nl/islandora/object/uuid:87730790-6166-4424-9d82-8fe815733f1e?collection=education.

  16. Aras, E., et al. (2017). Exploring the security vulnerabilities of LoRa. In 2017 3rd IEEE International conference on cybernetics (CYBCONF). IEEE.

  17. Tomasin, S., Zulian, S., & Vangelista, L. (2017). Security analysis of LoRaWAN join procedure for Internet of Things networks. In Wireless communications and networking conference workshops (WCNCW), 2017 IEEE. IEEE.

  18. Lee, J., et al. (2017). Risk analysis and countermeasure for bit-flipping attack in LoRaWAN. In 2017 International conference on information networking (ICOIN). IEEE.

  19. Feichtinger, K. (2018). Enhancing the security of over-the-air-activation of LoRaWAN using a hybrid cryptosystem. International Journal of Computer Science and Network ‘Security, 18(2), 1–9.

    Google Scholar 

  20. Sung, W.-J., et al. (2018). Protecting end-device from replay attack on LoRaWAN. In 2018 20th International conference on advanced communication technology (ICACT). IEEE.

  21. Kumar, P. (2016). Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sensors Journal, 16(1), 254–264.

    Article  Google Scholar 

  22. Wazid, M., et al. (2017). Secure remote user authenticated key establishment protocol for smart home environment. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1016/j.sysarc.2018.12.005.

  23. Tewari, A., & Gupta, B. B. (2017). A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. International Journal of Advanced Intelligence Paradigms, 9(2–3), 111–121.

    Article  Google Scholar 

  24. Cremers, C. J. F. (2008). The scyther tool: Verification, falsification, and analysis of security protocols. In International conference on computer aided verification. Springer, Berlin.

  25. Elbaz, A., Abd-elaziz, M. H., & Nazmy, M. T. (2014). Analysis and verification of a key agreement protocol over cloud computing using scyther tool. International Journal of Distributed and Cloud Computing, 2(2). 1–7.

  26. Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.

    Article  Google Scholar 

  27. Naoui, S., Elhdhili, M. E., & Saidane, L. A. (2017). Trusted third party based key management for LoraWAN architecture. In 2017 IEEE/ACS 14th international conference of computer systems and applications (AICCSA). IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarra Naoui.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naoui, S., Elhdhili, M.E. & Azouz Saidane, L. Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security. Wireless Pers Commun 110, 2109–2130 (2020). https://doi.org/10.1007/s11277-019-06832-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06832-x

Keywords

Navigation