Abstract
The Internet of Things (IoT) has given rise to a multitude of interconnected devices that generate vast volumes of data. Efficient data communication is essential for the success of IoT. LoRaWAN, known for its low power consumption, long-range reach, and suitability for low-data-rate applications, has emerged as a preferred wireless communication protocol. However, ensuring the security of sensitive data transmissions is imperative. This study focuses on IoT devices based on LoRaWAN, conducting a comprehensive survey of security schemes, MAC layer protocols, optimised routing algorithms, and multi-hop approaches to enhance performance. The integration of novel mechanisms to improve LoRaWAN security across diverse IoT devices and networks is crucial for its sustained growth in the smart IoT era. The application of AI and machine learning to energy-efficient LoRaWAN networks is a promising avenue for research. Additionally, efforts should be made to improve routing algorithm efficiency while accommodating network characteristics like low power and long-range communication.Advanced encryption and authentication systems are critical for improving LoRaWAN data transmission security. Security research should also concentrate on recognising and mitigating security risks. Designing strong key management systems, preventing replay attacks, assuring end-to-end encryption, protecting gateways, providing secure firmware update procedures, resolving privacy issues, and devising secure authentication techniques are all challenges. These activities are critical to realising LoRaWAN's full potential in IoT.
Similar content being viewed by others
References
Costa M, Soares P, Monteiro J, Afonso JA (2016). A LoRaWAN-compliant gateway architecture for smart city applications. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) (pp. 294–299). IEEE
Naoui S, Elhdhili ME, Saidane LA (2016) "Enhancing the security of the IoT LoraWAN architecture." 2016 international conference on performance evaluation and modeling in wired and wireless networks (PEMWN). IEEE
Sorniotti A, Baldini G, Giannetti F (2017). Security in LoRaWAN networks: Vulnerabilities detection and prevention. In 2017 IEEE Symposium on Computers and Communications (ISCC) (pp. 515–520). IEEE
Oniga B, et al (2017) "Analysis, design and implementation of secure LoRaWAN sensor networks." 2017 13th IEEE International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE
Kim J, Song J. "A dual key-based activation scheme for secure LoRaWAN. Wirel Commun Mob Comput. 2017;2017:1–12.
Na S, et al. (2017) "Scenario and countermeasure for replay attack using join request messages in LoRaWAN." 2017 international conference on information networking (ICOIN). IEEE,
Kim J, JooSeok S (2017) "A simple and efficient replay attack prevention scheme for LoRaWAN." Proceedings of the 2017 the 7th International Conference on Communication and Network Security
Oniga B, Haller SA, Voicu RC. Security Analysis of LoRaWAN. In: Gollmann D, Miyaji A, Kikuchi H, editors. In proceedings of the 16th International Conference on Information Security. Cham: Springer; 2017. p. 121–32.
Iskhakov S, Leppänen T, Ometov A (2017). Security vulnerabilities of LoRaWAN. In Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (pp. 936–941). ACM. https://doi.org/10.1145/3102304.3102375
Kim J, Song J. A study on the secure LoRaWAN protocol for IoT. J Secur Eng. 2017;14(6):713–21. https://doi.org/10.1166/jse.2017.1465.
Khan MAU, et al. A security analysis of LoRaWAN. Sensors. 2018;18(8):2597.
Yazar D, Sahin AB. LoRaWAN gateway selection using TOPSIS method. Int J Electr Comput Eng. 2018;8(2):828–37.
Kiani AK, Zubairi J (2018) LoRaWAN for IoT: Energy consumption modeling and analysis. In 2018 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE
El Fehri C, et al. LoRa technology MAC layer operations and research issues. Proced Comput Sci. 2018;130:1096–101.
Balleri P, Conzon D, Guglielmi M. “LoRa for the Internet of Things” EAI/Springer innovations in communication and computing. Cham: Springer; 2018. p. 205–19.
Demirbas D, Cetin B, Balta HN. A review of LPWAN technologies for IoT applications. J Netw Comput Appl. 2018;116:67–83. https://doi.org/10.1016/j.jnca.2018.07.005.
Dönmez TCM, Nigussie E. Security of lorawan v1. 1 in backward compatibility scenarios. Proced Comput Sci. 2018;134:51–8.
Sanchez-Iborra R, et al. Enhancing lorawan security through a lightweight and authenticated key management approach. Sensors. 2018;18.6:1833.
Kim J, Song J. A secure device-to-device link establishment scheme for LoRaWAN. IEEE Sens J. 2018;18(5):2153–60.
Chatzigiannakis I, Liagkou V, Spirakis PG (2018) "Brief announcement: Providing end-to-end secure communication in low-power wide area networks." Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings 2. Springer International Publishing
Tsai K-L, et al. AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access. 2018;6:45325–34.
Yang X, et al. (2018) "Security vulnerabilities in LoRaWAN." 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE
Danish SM, et al. (2018) "Network intrusion detection system for jamming attack in lorawan join procedure." 2018 IEEE International Conference on Communications (ICC). IEEE
Hofmann P, Schaffer P, Brunner M, Langer J. (2018). Security in LoRaWAN.Whitepaper. https://www.everythingrf.com/whitepapers/details/3352-security-in-lorawan
Sanchez-Iborra R, Cano MD, Santa J (2018). Efficient key management scheme for LoRaWAN. In Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference (CCNC) (pp. 1–7). IEEE. https://doi.org/10.1109/CCNC.2018.8319262
Kim J, Song J (2018). A replay attack against LoRaWAN. In Proceedings of the 2018 International Conference on Information Networking (ICOIN) (pp. 707–709). IEEE. https://doi.org/10.1109/ICOIN.2018.8343179
Harwahyu R, Ruki AF, Rizkika LY, Fitriawan H (2018) Development of LoRaWAN-based remote monitoring system using Aloha MAC protocol. In 2018 International Conference on Information and Communications Technology (ICOIACT) (pp. 346–350). IEEE
Reynders B, Torfs W, De Poorter E, Moerman I. A comparative study of LoRaWAN class A protocols for energy-efficient IoT applications. Sensors. 2018;18(9):3064. https://doi.org/10.3390/s18093064.
Zhu Y, Wang X, Li H. A survey on blockchain-based smart contracts: applications, challenges, and future trends. J Ind Inf Integr. 2018;10:1–11. https://doi.org/10.1016/j.jii.2018.01.003.
Al-Fuqaha MA, Guizani M, Mohammadi M, Aledhari M, Ayyash M. Comprehensive survey on LoRaWAN technology: protocol architecture, key features, applications, and open issues. IEEE Commun Surv Tutor. 2019;21(3):2234–87.
Bogdan Oniga V, Dadarlat SH, Halunga R. A secure LoRaWAN network architecture using remote access VPN. Wireless Pers Commun. 2019;105(2):481–94.
Hasan S, Kumar S, Chakraborty S. Multi-hop communication in LoRaWAN: a stochastic optimization approach. IEEE Internet Things J. 2019;6(2):2048–59.
Ertürk MA, Şahingöz OK, Çağlayan MU. The performance analysis of LoRa and LoRaWAN for sustainable smart city applications. Sensors. 2019;19(14):3097. https://doi.org/10.3390/s19143097.
Dönmez TCM, Nigussie E. IoT security and privacy: a survey of LoRaWAN. IEEE Commun Surv Tutor. 2019;21(3):2794–820. https://doi.org/10.1109/COMST.2019.2906032.
Marais JM, van Rooyen GJ, Nel W. An adaptive and predictive data rate mechanism for LoRaWAN. Sensors. 2019;19(14):3102. https://doi.org/10.3390/s19143102.
Rajaraman S, Palanisamy B, Kumar KM. A survey on blockchain-based internet of things: Applications, challenges, and future directions. J Netw Comput Appl. 2019;135:1–19. https://doi.org/10.1016/j.jnca.2019.03.016.
Zhang X, Wen Y, Zhang Y. Blockchain based trust management: opportunities and challenges. J Netw Comput Appl. 2019;135:62–75. https://doi.org/10.1016/j.jnca.2019.02.018.
Chen C, Li X, Zhang Y, Yang Y. A survey of blockchain-based systems. Futur Gener Comput Syst. 2019;97:512–27. https://doi.org/10.1016/j.future.2019.02.026.
Zhao Q, Zhang B, Peng K. A survey on the security of blockchain systems. Futur Gener Comput Syst. 2019;95:399–417. https://doi.org/10.1016/j.future.2019.01.064.
Vatandas T, Paverd A, Moessner K, Tafazolli R. Experimental evaluation of LoRaWAN security. IEEE Access. 2020;8:184288–302.
Sheikh MYB, Kim J, Mahmud MA, Huh EN. A survey on LoRaWAN for IoT: applications, prospects, and challenges. Electronics. 2020;9(6):1020.
Balaji AT, Sekaran KC, Vairavasundaram S. LoRaWAN: a low power wide area network for IoT applications. J Netw Comput Appl. 2020;146: 102436.
Stranahan J, John A (2020) LoRaWAN device security and energy optimization. Rowan University
Hu Y, Liu J, Li J, Gao Y, Tan Z. A gateway selection algorithm for LoRaWAN networks based on signal quality and availability. IEEE Internet Things J. 2020;7(11):10898–908.
Kumara ASU, Jayasinghe L, Kodituwakku SN. A novel gateway placement algorithm for LoRaWAN networks. IEEE Internet Things J. 2020;7(5):3655–66.
Kufakunesu R, Hancke GP, Abu-Mahfouz AM. Performance analysis of LoRaWAN for internet of things applications: a case study. Sensors. 2020;20(14):4012. https://doi.org/10.3390/s20144012.
Stranahan JA Jr. Analysis of MQTT-SN and LoRaWAN for Industrial IoT. J Commun. 2020;15(9):700–6. https://doi.org/10.12720/jcm.15.9.700-706.
Khan MNI, Islam MS, Ullah R. Ant colony optimization-based routing protocol for energy-efficient communication in LoRaWAN. J Ambient Intell Humaniz Comput. 2020;11(3):1153–65. https://doi.org/10.1007/s12652-019-01374-x.
Tiwari K, Goyal M, Singh S. A survey on blockchain technology for industry 4.0: Applications, challenges and future directions. J Ind Inform Integr. 2020;17:100120. https://doi.org/10.1016/j.jii.2019.100120.
Cai Z, Zhang Y, Liu W, Zhang J. Blockchain-based data integrity service framework for industrial Internet of Things. Futur Gener Comput Syst. 2020;108:714–22. https://doi.org/10.1016/j.future.2020.01.052.
Liu Y, Zheng Z, Chen H, Li X. A survey of blockchain security: from consensus to smart contracts. IEEE Access. 2020;8:102583–601. https://doi.org/10.1109/ACCESS.2020.2991955.
Lu X, Liang H, Li L. A survey on blockchain technology for data management in Internet of Things. IEEE Access. 2020;8:116083–101. https://doi.org/10.1109/ACCESS.2020.3002000.
Sahoo SS, Khuntia SK, Patnaik S. LoRaWAN: a study on the technology and its applications for IoT. Comput Netw. 2021;190: 108042.
Alharbi N, Alharbi S, Fortino G. A survey on LoRaWAN: architecture, applications, and research challenges. Sensors. 2021;21(3):1009.
Hossain MA, Al-Fuqaha A, Guizani M, Mohammadi M. Design and implementation of a smart waste management system using LoRaWAN technology. IEEE Internet Things J. 2021;8(5):3581–90.
Ahmed S, Akbar MA, Anjum A, Saeed U. An IoT-based low-cost air pollution monitoring system using LoRaWAN technology. IEEE Access. 2021;9:56537–48.
Ali MM, Javaid N, Ahmed A, Ahmad I, Khan ZA. Energy-aware gateway placement algorithm for LoRaWAN-based internet of things. IET Netw. 2021;10(2):43–50.
Sun J, Cui L, Cai Z. An energy-efficient gateway selection algorithm for LoRaWAN based on quality of service. IEEE Access. 2021;9:58906–16.
Khan SU, Khan MU, Zaheer R, Khan S. Blockchain technology: trends, challenges, and prospects. Sci Prog. 2021;104(2):0036850420980241. https://doi.org/10.1177/0036850420980241.
Kumar A, Kumari S, Choudhary R. A survey on consensus algorithms in blockchain. Int J Inf Manage. 2021;56: 102263. https://doi.org/10.1016/j.ijinfomgt.2020.102263.
Mehic M, et al. LoRaWAN end nodes: security and energy efficiency analysis. Alex Eng J. 2022;61(11):8997–9009.
Hessel F, Almon L, Hollick M. LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation. ACM Trans Sens Netw (TOSN). 2022;18:1–55.
Mehic M, Begovic I, Omanovic S, Suljanovic N. Security issues in LoRaWAN networks: a survey. Comput Secur. 2022;110: 102429. https://doi.org/10.1016/j.cose.2021.102429.
Funding
There is no funding for this paper.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
“This article is part of the topical collection “Advances in Computational Approaches for Image Processing, Wireless Networks, Cloud Applications and Network Security” guest edited by P. Raviraj, Maode Ma and Roopashree H R.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sowmya, M., Sundaram, S.M. & Murugesan, P. A Survey on Secure Data Transfer in the Development of Internet of Things (IoT) Applications Using LoRaWAN Technology. SN COMPUT. SCI. 5, 342 (2024). https://doi.org/10.1007/s42979-024-02707-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-02707-6