skip to main content
10.1145/3549206.3549312acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesic3Conference Proceedingsconference-collections
research-article

De-Fence: LoRa based Hop-to-Hop Communication

Authors Info & Claims
Published:24 October 2022Publication History

ABSTRACT

The need for a low-power reliable form of communication is ever-present in a multitude of fields. Our paper aims to develop and explore a security-oriented application of LoRa-based hop-to-hop communication, which provides low-power, large-scale, and long-range solutions to our current safety needs. It utilizes all the components of an IoT-based implementation, in to develop a network, which consists of different types of nodes. It takes input from the external environment through sensors, transports it via several intermediate nodes, using an effective routing algorithm, and provides output through the means of an actuator. The system achieved henceforth is highly scalable, reliable, portable, cheap, and easy to maintain, and provides a fresh outlook on the contemporary need of modernizing the security infrastructure using a growing non-cellular form of communication, LoRa technology.

References

  1. U. Noreen, A. Bounceur and L. Clavier, "A study of LoRa low power and wide area network technology," 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2017, pp. 1-6, doi: 10.1109/ATSIP.2017.8075570.Google ScholarGoogle Scholar
  2. Augustin, A., Yi, J., Clausen, T., and Townsley, W., 2016. A Study of LoRa: Long Range & Low Power Networks for the Internet of Things. Sensors, 16(9), p.1466.Google ScholarGoogle Scholar
  3. Dias and A. Grilo, “LoRaWAN multi-hop uplink extension,” Procedia Computer Science, vol. 130, pp. 424–431, 2018, doi: 10.1016/j.procs.2018.04.063.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Berto, P. Napoletano, and M. Savi, “A LoRa-based mesh network for peer-to-peer long-range communication,” Sensors, vol. 21, no. 13, 2021, doi: 10.3390/s21134314.Google ScholarGoogle Scholar
  5. Y. Lalle, M. Fourati, L. C. Fourati, and J. P. Barraca, "Routing strategies for lorawan multi-hop networks: a survey and an sdn-based solution for smart water grid," in IEEE Access, vol. 9, pp. 168624-168647, 2021, doi: 10.1109/ACCESS.2021.3135080.Google ScholarGoogle ScholarCross RefCross Ref
  6. G. Peruzzi and A. Pozzebon, “Combining LoRaWAN and NB-IoT for edge-to-cloud low power connectivity leveraging on fog computing,” Applied Sciences, vol. 12, no. 3, 2022, doi: 10.3390/app12031497.Google ScholarGoogle Scholar
  7. E. Aras, G. S. Ramachandran, P. Lawrence, and D. Hughes, "Exploring the security vulnerabilities of LoRa," 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), 2017, pp. 1-6, doi: 10.1109/CYBConf.2017.7985777.Google ScholarGoogle Scholar
  8. Singal, G., Laxmi, V., Gaur, M., Rao, D., Kushwaha, R., Garg, D., and Kumar, N., 2022. QoS–aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges. ACM Transactions on Internet Technology, 22(1), pp.1-27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Singal, G., Laxmi, V., Rao, V., Todi, S., and Gaur, M., 2016. Improved multicast routing in MANETs using link stability and route stability. International Journal of Communication Systems, 30(11), p.e3243.Google ScholarGoogle ScholarCross RefCross Ref
  10. Singal, Gaurav, Vijay Laxmi, Manoj Singh Gaur, Swati Todi, Vijay Rao, and Akka Zemmari. "MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks." In 2016 Wireless Days (WD), pp. 1-6. IEEE, 2016.Google ScholarGoogle Scholar
  11. Brahmbhatt, S., Kulshrestha, A. and Singal, G., 2015. SSLSM: Signal Strength Based Link Stability Estimation in MANETs. 2015 International Conference on Computational Intelligence and Communication Networks (CICN).Google ScholarGoogle Scholar
  12. Singal, G., Garg, H., Laxmi, V., Gaur, M., and Lai, C., 2014. Impact analysis of attacks in multicast routing algorithms in MANETs. 2014 9th International Conference on Industrial and Information Systems (ICIIS).Google ScholarGoogle Scholar
  13. “Wireless, Sensing & Timing DATASHEET - Adafruit Industries,” SX1276/77/78/79 - 137 MHz to 1020 MHz Low Power Long Range Transceiver. [Online]. Available: https://cdn-shop.adafruit.com/product-files/3179/sx1276_77_78_79.pdf. [Accessed: 26-Apr-2022].Google ScholarGoogle Scholar
  14. Kumar, Rakesh, Mayank Swarnkar, Gaurav Singal, and Neeraj Kumar. "IoT Network Traffic Classification using Machine Learning Algorithms: An Experimental Analysis." IEEE Internet of Things Journal (2021).Google ScholarGoogle Scholar
  15. Ahuja, Nisha, Gaurav Singal, and Debajyoti Mukhopadhyay. "DLSDN: Deep learning for DDOS attack detection in software defined networking." In 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 683-688. IEEE, 2021.Google ScholarGoogle Scholar
  16. Thomas, Ashish, Vijay Kr Sharma, and Gaurav Singhal. "Secure link establishment method to prevent jelly fish attack in MANET." In 2015 International Conference on Computational Intelligence and Communication Networks (CICN), pp. 1153-1158. IEEE, 2015.Google ScholarGoogle Scholar
  17. Patel, Narendra Kumar, and Gaurav Singal. "Selective Forwarding Attack In Leach In Wsn." Int. J. Electron. Electr. Comput. Syst. Ijeecs 1, no. 1 (2013): 1-5.Google ScholarGoogle Scholar
  18. Ahuja, Nisha, Gaurav Singal, Debajyoti Mukhopadhyay, and Ajay Nehra. "Ascertain the efficient machine learning approach to detect different ARP attacks." Computers and Electrical Engineering 99 (2022): 107757.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Jain, Shreyansh Sharad, Gaurav Singal, Deepak Garg, and Suneet Kumar Gupta. "SecureDorm: Sensor-Based Girls Hostel Surveillance System." In Smart Systems and IoT: Innovations in Computing, pp. 327-337. Springer, Singapore, 2020.Google ScholarGoogle Scholar

Index Terms

  1. De-Fence: LoRa based Hop-to-Hop Communication

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IC3-2022: Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing
      August 2022
      710 pages
      ISBN:9781450396752
      DOI:10.1145/3549206

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 October 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format