| Literature DB >> 30453524 |
Jetmir Haxhibeqiri1, Eli De Poorter2, Ingrid Moerman3, Jeroen Hoebeke4.
Abstract
LoRaWAN is one of the low power wide area network (LPWAN) technologies that have received significant attention by the research community in the recent years. It offers low-power, low-data rate communication over a wide range of covered area. In the past years, the number of publications regarding LoRa and LoRaWAN has grown tremendously. This paper provides an overview of research work that has been published from 2015 to September 2018 and that is accessible via Google Scholar and IEEE Explore databases. First, a detailed description of the technology is given, including existing security and reliability mechanisms. This literature overview is structured by categorizing papers according to the following topics: (i) physical layer aspects; (ii) network layer aspects; (iii) possible improvements; and (iv) extensions to the standard. Finally, a strengths, weaknesses, opportunities and threats (SWOT) analysis is presented along with the challenges that LoRa and LoRaWAN still face.Entities:
Keywords: IoT; IoT applications; LPWANs; LoRa; LoRaWAN
Year: 2018 PMID: 30453524 PMCID: PMC6264067 DOI: 10.3390/s18113995
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1LoRa preamble.
Figure 2LoRa frame structure.
Figure 3LoRaWAN network topology.
Figure 4ADR mechanism algorithm implemented in the end node.
LoRaWAN keys.
| Key | Description | Required in Joining Type | Generated from | |
|---|---|---|---|---|
| OTAA | ABP | |||
| LoRaWAN v1.1 | ||||
| Keys needed before activation | ||||
| NwkKey | Is used to calculate MIC | Yes | No | Stored beforehand |
| AppKey | Is used to derive AppSKey | Yes | No | Stored beforehand |
| JSIntKey | Is used for MIC of rejoin-request | Yes | No | Generated from |
| JSEncKey | Is used to encrypt join-accept | Yes | No | Generated from |
| Keys needed after activation | ||||
| FNwkSIntKey | Is used for calculate MIC of part | Yes | Yes | Generated from NwkKey |
| SNwkSIntKey | Is used to verify MIC of all | Yes | Yes | Generated from NwkKey |
| NwkSEncKey | Is used to encrypt all | Yes | Yes | Generated from NwkKey |
| AppSKey | Is used to encrypt/decrypt | Yes | Yes | Generated from AppKey |
| Identifiers | ||||
| JoinEUI | 64-bit globally unique application ID | Yes | No | Stored beforehand |
| DevEUI | 64-bit globally unique device ID | Yes | No | Stored beforehand |
| DevAddr | 32-bit unique device address | Yes | Yes | Received by |
| LoRaWAN v1.0 | ||||
| Keys needed before activation | ||||
| AppKey | Is used to derive AppSKey | Yes | No | Stored beforehand |
| Keys needed after activation | ||||
| NwkSKey | Is used to encrypt all MAC packets only | Yes | Yes | Generated from AppKey |
| AppSKey | Is used to encrypt/decrypt | Yes | Yes | Generated from AppKey |
| Identifiers | ||||
| AppEUI | 64-bit globally unique application ID | Yes | No | Stored beforehand |
| DevEUI | 64-bit globally unique device ID | Yes | No | Stored beforehand |
| DevAddr | 32-bit unique device address | Yes | Yes | Received by |
Figure 5Over the air activation procedure according to lor [11].
LoRaWAN applications.
| Study | Filed of Application | Studied LoRaWAN Performance Indicators | ||
|---|---|---|---|---|
| Path Loss | PLR | Power Consumption | ||
| [ | Medical | • | • | |
| [ | Medical | • | • | • |
| [ | Agriculture | |||
| [ | Agriculture | • | ||
| [ | Agriculture | • | ||
| [ | Agriculture | • | ||
| [ | Sensor Networks | • | • | |
| [ | Sensor Networks | • | ||
| [ | Traffic Monitoring | • | • | |
| [ | Localization | • | ||
| [ | Tele-metering | • | • | |
| [ | Smart Grid | |||
| [ | Smart City | • | • | |
LoRaWAN deployed setups.
| Study | Environment | Studied LoRaWAN Performance Indicators | Comments | |||
|---|---|---|---|---|---|---|
| Path Loss | PLR | Throughput | Delay | |||
| [ | Outdoor | Yes | Yes | No | No | @2 km distance using SF12 |
| [ | Outdoor | Yes | No | No | No | @2 km distance |
| [ | Outdoor | Yes | Yes | Yes | No | @2 km distance using SF12 |
| [ | Outdoor-Indoor | Yes | Yes | No | No | @2 km distance |
| [ | Indoor | Yes | Yes | Yes | Yes | @60 m distance with SF12 |
| [ | Indoor | Yes | Yes | No | No | @60 m distance with SF12 |
| [ | Indoor | Yes | No | No | No | @~32 m distance |
| [ | Industrial | Yes | Yes | No | No | @~190 m distance |
| [ | City Outdoor | Yes | No | No | No | |
LoRaWAN simulators.
| Study | Environment | Included Features | |||||
|---|---|---|---|---|---|---|---|
| Multi GW | Uplink Confirmed | Donlink Traffic | Downlink Confirmed Traffic | MAC Commands | Phy Model | ||
| [ | NS3 | Yes | Yes | Yes | Yes | No | All interference based |
| [ | NS3 | Yes | Yes | Yes | Yes | Yes | Power difference based |
| [ | Python | Yes | No | No | No | No | Power difference based |
| [ | Python | Yes | No | Yes | No | No | Power difference based |
| [ | Python | Yes | No | No | No | No | SIR based with |
| [ | NS3 | No | No | No | No | Yes | Received power based |
| [ | NS3 | Extend the LoRaWAN module in [ | |||||
| [ | C++ | No | Yes | No | No | No | SNR based |
Figure 6Packet loss ratio for different coverage test using SF12. Distanc from gateway was ~2 km for outdoor measurements and ~60 m for indoor measurements.
Proposed system models for LoRaWAN.
| Study | Model | Considered Interference | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Dominant Co-SF | Cumulative Co-SF | Dominant Inter-SF | Cumulative Inter-SF | Co and Inter-SF | Path Loss Model | Channel Fading | Other Interference | ||
| [ | Mathema. | No | No | No | No | No | None | No | No |
| [ | Mathema. | Yes | No | No | No | No | Yes | No | No |
| [ | Mathema. | Yes | No | No | No | No | Yes | No | No |
| [ | Mathema. | Yes | No | No | No | No | Yes | No | No |
| [ | Mathema. | Yes | Yes | No | No | No | Yes | No | No |
| [ | Mathema. | Yes | Yes | No | No | No | Yes | Yes | Yes |
| [ | Mathema. | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
| [ | Mathema. | Models only the network activation procedure | |||||||
| [ | Empir. | Yes | No | No | No | No | Yes | No | No |
| [ | Empir. | Yes | No | No | No | No | No | No | No |
| [ | Empir. | Yes | Yes | Yes | Yes | Yes | Yes | No | No |
| [ | Simu. | Yes | Yes | Yes | Yes | Yes | Yes | No | No |
Figure 7Interference scenarios that are taken into account in LoRaWAN models.
Power consumption modeling for LoRaWAN.
| Study | Model | Traffic Type Considered | ||
|---|---|---|---|---|
| Uplink Only | UL ACKed | Downlink | ||
| [ | Mathematical | Yes | Yes | No |
| [ | Empirical | Yes | No | No |
| [ | Simulation | Yes | Yes | No |
| [ | Empirical | Yes | No | No |
LoRaWAN security aspects research.
| Study | Studied Security Aspects | Description |
|---|---|---|
| [ | Data replay attacks for ABP | Re-keying after every reset of counter overflow. |
| [ | Key management issues. | Add proxy nodes to drive a reputation |
| [ | Replay attack | Use of sequential DevNonce. |
| [ | Replay attack | In addition to DevNonce use RSSI |
| [ | ATAA join-procedure security | Use hybrid crypotosystem including |
| [ | Replay attack | Masking the join-request packet by a |
| [ | Replay attack | Two types of join-request packets. The initial ones packets |
| [ | Static Context of | It involves session key update mechanism into LoRaWAN based on |
| [ | Encryption | Secure Low Power Communication method (SeLPC) that reduces the |
SWOT analyses table.
| Strengths | Weaknesses |
|---|---|
| - Large coverage in outdoor environments | - Security issues |
|
|
|
| - Power usage can decrease further | - Scalability issues in UL under heavy network load. |