Skip to main content
Log in

A Survey on Secure Data Transfer in the Development of Internet of Things (IoT) Applications Using LoRaWAN Technology

  • Review Article
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) has given rise to a multitude of interconnected devices that generate vast volumes of data. Efficient data communication is essential for the success of IoT. LoRaWAN, known for its low power consumption, long-range reach, and suitability for low-data-rate applications, has emerged as a preferred wireless communication protocol. However, ensuring the security of sensitive data transmissions is imperative. This study focuses on IoT devices based on LoRaWAN, conducting a comprehensive survey of security schemes, MAC layer protocols, optimised routing algorithms, and multi-hop approaches to enhance performance. The integration of novel mechanisms to improve LoRaWAN security across diverse IoT devices and networks is crucial for its sustained growth in the smart IoT era. The application of AI and machine learning to energy-efficient LoRaWAN networks is a promising avenue for research. Additionally, efforts should be made to improve routing algorithm efficiency while accommodating network characteristics like low power and long-range communication.Advanced encryption and authentication systems are critical for improving LoRaWAN data transmission security. Security research should also concentrate on recognising and mitigating security risks. Designing strong key management systems, preventing replay attacks, assuring end-to-end encryption, protecting gateways, providing secure firmware update procedures, resolving privacy issues, and devising secure authentication techniques are all challenges. These activities are critical to realising LoRaWAN's full potential in IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Costa M, Soares P, Monteiro J, Afonso JA (2016). A LoRaWAN-compliant gateway architecture for smart city applications. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) (pp. 294–299). IEEE

  2. Naoui S, Elhdhili ME, Saidane LA (2016) "Enhancing the security of the IoT LoraWAN architecture." 2016 international conference on performance evaluation and modeling in wired and wireless networks (PEMWN). IEEE

  3. Sorniotti A, Baldini G, Giannetti F (2017). Security in LoRaWAN networks: Vulnerabilities detection and prevention. In 2017 IEEE Symposium on Computers and Communications (ISCC) (pp. 515–520). IEEE

  4. Oniga B, et al (2017) "Analysis, design and implementation of secure LoRaWAN sensor networks." 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE

  5. Kim J, Song J. "A dual key-based activation scheme for secure LoRaWAN. Wirel Commun Mob Comput. 2017;2017:1–12.

    Google Scholar 

  6. Na S, et al. (2017) "Scenario and countermeasure for replay attack using join request messages in LoRaWAN." 2017 international conference on information networking (ICOIN). IEEE,

  7. Kim J, JooSeok S (2017) "A simple and efficient replay attack prevention scheme for LoRaWAN." Proceedings of the 2017 the 7th International Conference on Communication and Network Security

  8. Oniga B, Haller SA, Voicu RC. Security Analysis of LoRaWAN. In: Gollmann D, Miyaji A, Kikuchi H, editors. In proceedings of the 16th International Conference on Information Security. Cham: Springer; 2017. p. 121–32.

    Google Scholar 

  9. Iskhakov S, Leppänen T, Ometov A (2017). Security vulnerabilities of LoRaWAN. In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (pp. 936–941). ACM. https://doi.org/10.1145/3102304.3102375

  10. Kim J, Song J. A study on the secure LoRaWAN protocol for IoT. J Secur Eng. 2017;14(6):713–21. https://doi.org/10.1166/jse.2017.1465.

    Article  Google Scholar 

  11. Khan MAU, et al. A security analysis of LoRaWAN. Sensors. 2018;18(8):2597.

    Google Scholar 

  12. Yazar D, Sahin AB. LoRaWAN gateway selection using TOPSIS method. Int J Electr Comput Eng. 2018;8(2):828–37.

    Google Scholar 

  13. Kiani AK, Zubairi J (2018) LoRaWAN for IoT: Energy consumption modeling and analysis. In 2018 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE

  14. El Fehri C, et al. LoRa technology MAC layer operations and research issues. Proced Comput Sci. 2018;130:1096–101.

    Article  Google Scholar 

  15. Balleri P, Conzon D, Guglielmi M. “LoRa for the Internet of Things” EAI/Springer innovations in communication and computing. Cham: Springer; 2018. p. 205–19.

    Google Scholar 

  16. Demirbas D, Cetin B, Balta HN. A review of LPWAN technologies for IoT applications. J Netw Comput Appl. 2018;116:67–83. https://doi.org/10.1016/j.jnca.2018.07.005.

    Article  Google Scholar 

  17. Dönmez TCM, Nigussie E. Security of lorawan v1. 1 in backward compatibility scenarios. Proced Comput Sci. 2018;134:51–8.

    Article  Google Scholar 

  18. Sanchez-Iborra R, et al. Enhancing lorawan security through a lightweight and authenticated key management approach. Sensors. 2018;18.6:1833.

    Article  Google Scholar 

  19. Kim J, Song J. A secure device-to-device link establishment scheme for LoRaWAN. IEEE Sens J. 2018;18(5):2153–60.

    Article  Google Scholar 

  20. Chatzigiannakis I, Liagkou V, Spirakis PG (2018) "Brief announcement: Providing end-to-end secure communication in low-power wide area networks." Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings 2. Springer International Publishing

  21. Tsai K-L, et al. AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access. 2018;6:45325–34.

    Article  Google Scholar 

  22. Yang X, et al. (2018) "Security vulnerabilities in LoRaWAN." 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE

  23. Danish SM, et al. (2018) "Network intrusion detection system for jamming attack in lorawan join procedure." 2018 IEEE International Conference on Communications (ICC). IEEE

  24. Hofmann P, Schaffer P, Brunner M, Langer J. (2018). Security in LoRaWAN.Whitepaper. https://www.everythingrf.com/whitepapers/details/3352-security-in-lorawan

  25. Sanchez-Iborra R, Cano MD, Santa J (2018). Efficient key management scheme for LoRaWAN. In Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 1–7). IEEE. https://doi.org/10.1109/CCNC.2018.8319262

  26. Kim J, Song J (2018). A replay attack against LoRaWAN. In Proceedings of the 2018 International Conference on Information Networking (ICOIN) (pp. 707–709). IEEE. https://doi.org/10.1109/ICOIN.2018.8343179

  27. Harwahyu R, Ruki AF, Rizkika LY, Fitriawan H (2018) Development of LoRaWAN-based remote monitoring system using Aloha MAC protocol. In 2018 International Conference on Information and Communications Technology (ICOIACT) (pp. 346–350). IEEE

  28. Reynders B, Torfs W, De Poorter E, Moerman I. A comparative study of LoRaWAN class A protocols for energy-efficient IoT applications. Sensors. 2018;18(9):3064. https://doi.org/10.3390/s18093064.

    Article  Google Scholar 

  29. Zhu Y, Wang X, Li H. A survey on blockchain-based smart contracts: applications, challenges, and future trends. J Ind Inf Integr. 2018;10:1–11. https://doi.org/10.1016/j.jii.2018.01.003.

    Article  Google Scholar 

  30. Al-Fuqaha MA, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Comprehensive survey on LoRaWAN technology: protocol architecture, key features, applications, and open issues. IEEE Commun Surv Tutor. 2019;21(3):2234–87.

    Google Scholar 

  31. Bogdan Oniga V, Dadarlat SH, Halunga R. A secure LoRaWAN network architecture using remote access VPN. Wireless Pers Commun. 2019;105(2):481–94.

    Google Scholar 

  32. Hasan S, Kumar S, Chakraborty S. Multi-hop communication in LoRaWAN: a stochastic optimization approach. IEEE Internet Things J. 2019;6(2):2048–59.

    Google Scholar 

  33. Ertürk MA, Şahingöz OK, Çağlayan MU. The performance analysis of LoRa and LoRaWAN for sustainable smart city applications. Sensors. 2019;19(14):3097. https://doi.org/10.3390/s19143097.

    Article  Google Scholar 

  34. Dönmez TCM, Nigussie E. IoT security and privacy: a survey of LoRaWAN. IEEE Commun Surv Tutor. 2019;21(3):2794–820. https://doi.org/10.1109/COMST.2019.2906032.

    Article  Google Scholar 

  35. Marais JM, van Rooyen GJ, Nel W. An adaptive and predictive data rate mechanism for LoRaWAN. Sensors. 2019;19(14):3102. https://doi.org/10.3390/s19143102.

    Article  Google Scholar 

  36. Rajaraman S, Palanisamy B, Kumar KM. A survey on blockchain-based internet of things: Applications, challenges, and future directions. J Netw Comput Appl. 2019;135:1–19. https://doi.org/10.1016/j.jnca.2019.03.016.

    Article  Google Scholar 

  37. Zhang X, Wen Y, Zhang Y. Blockchain based trust management: opportunities and challenges. J Netw Comput Appl. 2019;135:62–75. https://doi.org/10.1016/j.jnca.2019.02.018.

    Article  Google Scholar 

  38. Chen C, Li X, Zhang Y, Yang Y. A survey of blockchain-based systems. Futur Gener Comput Syst. 2019;97:512–27. https://doi.org/10.1016/j.future.2019.02.026.

    Article  Google Scholar 

  39. Zhao Q, Zhang B, Peng K. A survey on the security of blockchain systems. Futur Gener Comput Syst. 2019;95:399–417. https://doi.org/10.1016/j.future.2019.01.064.

    Article  Google Scholar 

  40. Vatandas T, Paverd A, Moessner K, Tafazolli R. Experimental evaluation of LoRaWAN security. IEEE Access. 2020;8:184288–302.

    Google Scholar 

  41. Sheikh MYB, Kim J, Mahmud MA, Huh EN. A survey on LoRaWAN for IoT: applications, prospects, and challenges. Electronics. 2020;9(6):1020.

    Google Scholar 

  42. Balaji AT, Sekaran KC, Vairavasundaram S. LoRaWAN: a low power wide area network for IoT applications. J Netw Comput Appl. 2020;146: 102436.

    Google Scholar 

  43. Stranahan J, John A (2020) LoRaWAN device security and energy optimization. Rowan University

  44. Hu Y, Liu J, Li J, Gao Y, Tan Z. A gateway selection algorithm for LoRaWAN networks based on signal quality and availability. IEEE Internet Things J. 2020;7(11):10898–908.

    Google Scholar 

  45. Kumara ASU, Jayasinghe L, Kodituwakku SN. A novel gateway placement algorithm for LoRaWAN networks. IEEE Internet Things J. 2020;7(5):3655–66.

    Google Scholar 

  46. Kufakunesu R, Hancke GP, Abu-Mahfouz AM. Performance analysis of LoRaWAN for internet of things applications: a case study. Sensors. 2020;20(14):4012. https://doi.org/10.3390/s20144012.

    Article  Google Scholar 

  47. Stranahan JA Jr. Analysis of MQTT-SN and LoRaWAN for Industrial IoT. J Commun. 2020;15(9):700–6. https://doi.org/10.12720/jcm.15.9.700-706.

    Article  Google Scholar 

  48. Khan MNI, Islam MS, Ullah R. Ant colony optimization-based routing protocol for energy-efficient communication in LoRaWAN. J Ambient Intell Humaniz Comput. 2020;11(3):1153–65. https://doi.org/10.1007/s12652-019-01374-x.

    Article  Google Scholar 

  49. Tiwari K, Goyal M, Singh S. A survey on blockchain technology for industry 4.0: Applications, challenges and future directions. J Ind Inform Integr. 2020;17:100120. https://doi.org/10.1016/j.jii.2019.100120.

    Article  Google Scholar 

  50. Cai Z, Zhang Y, Liu W, Zhang J. Blockchain-based data integrity service framework for industrial Internet of Things. Futur Gener Comput Syst. 2020;108:714–22. https://doi.org/10.1016/j.future.2020.01.052.

    Article  Google Scholar 

  51. Liu Y, Zheng Z, Chen H, Li X. A survey of blockchain security: from consensus to smart contracts. IEEE Access. 2020;8:102583–601. https://doi.org/10.1109/ACCESS.2020.2991955.

    Article  Google Scholar 

  52. Lu X, Liang H, Li L. A survey on blockchain technology for data management in Internet of Things. IEEE Access. 2020;8:116083–101. https://doi.org/10.1109/ACCESS.2020.3002000.

    Article  Google Scholar 

  53. Sahoo SS, Khuntia SK, Patnaik S. LoRaWAN: a study on the technology and its applications for IoT. Comput Netw. 2021;190: 108042.

    Google Scholar 

  54. Alharbi N, Alharbi S, Fortino G. A survey on LoRaWAN: architecture, applications, and research challenges. Sensors. 2021;21(3):1009.

    Google Scholar 

  55. Hossain MA, Al-Fuqaha A, Guizani M, Mohammadi M. Design and implementation of a smart waste management system using LoRaWAN technology. IEEE Internet Things J. 2021;8(5):3581–90.

    Google Scholar 

  56. Ahmed S, Akbar MA, Anjum A, Saeed U. An IoT-based low-cost air pollution monitoring system using LoRaWAN technology. IEEE Access. 2021;9:56537–48.

    Google Scholar 

  57. Ali MM, Javaid N, Ahmed A, Ahmad I, Khan ZA. Energy-aware gateway placement algorithm for LoRaWAN-based internet of things. IET Netw. 2021;10(2):43–50.

    Google Scholar 

  58. Sun J, Cui L, Cai Z. An energy-efficient gateway selection algorithm for LoRaWAN based on quality of service. IEEE Access. 2021;9:58906–16.

    Google Scholar 

  59. Khan SU, Khan MU, Zaheer R, Khan S. Blockchain technology: trends, challenges, and prospects. Sci Prog. 2021;104(2):0036850420980241. https://doi.org/10.1177/0036850420980241.

    Article  Google Scholar 

  60. Kumar A, Kumari S, Choudhary R. A survey on consensus algorithms in blockchain. Int J Inf Manage. 2021;56: 102263. https://doi.org/10.1016/j.ijinfomgt.2020.102263.

    Article  Google Scholar 

  61. Mehic M, et al. LoRaWAN end nodes: security and energy efficiency analysis. Alex Eng J. 2022;61(11):8997–9009.

    Article  Google Scholar 

  62. Hessel F, Almon L, Hollick M. LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation. ACM Trans Sens Netw (TOSN). 2022;18:1–55.

    Article  Google Scholar 

  63. Mehic M, Begovic I, Omanovic S, Suljanovic N. Security issues in LoRaWAN networks: a survey. Comput Secur. 2022;110: 102429. https://doi.org/10.1016/j.cose.2021.102429.

    Article  Google Scholar 

Download references

Funding

There is no funding for this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Sowmya.

Ethics declarations

Conflict of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

“This article is part of the topical collection “Advances in Computational Approaches for Image Processing, Wireless Networks, Cloud Applications and Network Security” guest edited by P. Raviraj, Maode Ma and Roopashree H R.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sowmya, M., Sundaram, S.M. & Murugesan, P. A Survey on Secure Data Transfer in the Development of Internet of Things (IoT) Applications Using LoRaWAN Technology. SN COMPUT. SCI. 5, 342 (2024). https://doi.org/10.1007/s42979-024-02707-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-02707-6

Keywords

Navigation