| Literature DB >> 29874839 |
Ramon Sanchez-Iborra1, Jesús Sánchez-Gómez2, Salvador Pérez3, Pedro J Fernández4, José Santa5, José L Hernández-Ramos6,7, Antonio F Skarmeta8.
Abstract
Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.Entities:
Keywords: EDHOC; Internet of Things; LoRaWAN; key management; security
Year: 2018 PMID: 29874839 PMCID: PMC6021899 DOI: 10.3390/s18061833
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Overview of the OTAA join procedure.
Figure 2Frame sizes of IKEv2 protocol only taking into account IKEv2 header and payload.
Figure 3Overview of the EDHOC integration to enhance LoRaWAN key management.
Figure 4Architecture of the proposed security solution.
Figure 5LoRa frame finally created to transport EDHOC messages.
Figure 6Message sizes of DTLS Handshake and CoAP/EDHOC protocols from the end-device and network server sides with PSK-based authentication.
Figure 7Sizes of MAC frames (LoRaWAN) including CoAP/EDHOC messages.
Time-on-Air (ToA) of EDHOC messages and maximum admissible transmission times for different LoRa SF configurations.
| Spreading Factor | ToA EDHOC Frame 1 (113 B) | ToA EDHOC Frame 2 (143 B) | ToA EDHOC Frame 3 (71 B) | Maximum ToA |
|---|---|---|---|---|
| SF7 | 189.70 ms | 235.78 ms | 128.26 ms | 399.62 ms |
| SF8 | 338.43 ms | 420.35 ms | 236.03 ms | 707.07 ms |
| SF9 * | 615.42 ms | 738.30 ms | 410.62 ms | 676.83 ms |
| SF10 * | 1107.97 ms | 1353.73 ms | 780.29 ms | 698.37 ms |
| SF11 * | 2461.70 ms | 2953.22 ms | 1642.50 ms | 1560.58 ms |
| SF12 * | 4431.87 ms | 5414.91 ms | 3121.15 ms | 2793.47 ms |
* Valid LoRaWAN configuration for supporting the EDHOC transaction.