| Literature DB >> 35808559 |
Gaurav Pathak1, Jairo Gutierrez1, Akbar Ghobakhlou1, Saeed Ur Rehman2.
Abstract
The Internet of Things (IoT) is one of the fastest emerging technologies in the industry. It includes diverse applications with different requirements to provide services to users. Secure, low-powered, and long-range transmissions are some of the most vital requirements in developing IoT applications. IoT uses several communication technologies to fulfill transmission requirements. However, Low Powered Wide Area Networks (LPWAN) transmission standards have been gaining attention because of their exceptional low-powered and long-distance transmission capabilities. The features of LPWAN transmission standards make them a perfect candidate for IoT applications. However, the current LPWAN standards lack state-of-the-art security mechanism s because of the limitations of the IoT devices in energy and computational capacity. Most of the LPWAN standards, such as Sigfox, NB-IoT, and Weightless, use static keys for node authentication and encryption. LoRaWAN is the only LPWAN technology providing session key mechanisms for better security. However, the session key mechanism is vulnerable to replay attacks. In this paper, we propose a centralized lightweight session key mechanism for LPWAN standards using the Blom-Yang key agreement (BYka) mechanism. The security of the session key mechanism is tested using the security verification tool Scyther. In addition, an energy consumption model is implemented on the LoRaWAN protocol using the NS3 simulator to verify the energy depletion in a LoRaWAN node because of the proposed session key mechanisms. The proposed session key is also verified on the Mininet-WiFi emulator for its correctness. The analysis demonstrates that the proposed session key mechanism uses a fewer number of transmissions than the existing session key mechanisms in LPWAN and provides mechanisms against replay attacks that are possible in current LPWAN session key schemes.Entities:
Keywords: IoT security; LPWAN; key exchange; session keys
Year: 2022 PMID: 35808559 PMCID: PMC9269823 DOI: 10.3390/s22135065
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1The BYka Process.
Figure 2Session Key Architecture.
Figure 3Sequence Diagram for the Session Key Generation.
Figure 4Mininet-WiFi Experiment Topology.
Figure 5Key Exchange Verification in Mininet-WiFi.
Security Analysis Results of the LPWAN Session Key Mechanism.
| Claim | Status | Attack Patterns |
|---|---|---|
| Network Entity: Server | ||
| Alive | OK Verified | No Attacks |
| Weakagree | OK Verified | No Attacks |
| Niagree | OK Verified | No Attacks |
| Nisynch | OK Verified | No Attacks |
| SKR(Rd)k(Dev, Srv) | OK Verified | No Attacks |
| Network Entity: End Node | ||
| Alive | OK Verified | No Attacks |
| Weakagree | OK Verified | No Attacks |
| Niagree | OK Verified | No Attacks |
| Nisynch | OK Verified | No Attacks |
| SKR(Rd)k(Dev, Srv) | OK Verified | No Attacks |
Simulation Parameters.
| Parameters | Values |
|---|---|
| Simulation Time | 24 h |
| Initial Node Energy | 10,000 J |
| Supply Voltage | 3.3 V |
| Current for Packet Transmission | 0.028 A |
| Current for Packet Reception | 0.0112 A |
| Number of Gateways | 1 |
| Number of Nodes | 1 |
| Data Rate | 12 Packets/Minute |
Figure 6Energy Consumption of the LPWAN Session Key Mechanism.
LoRaWAN Energy Consumption Analysis.
| Data Rate | LoRaWAN Energy Consumption with Session Key Mechanism (J) | LoRaWAN Energy Consumption without Session Key Mechanism (J) |
|---|---|---|
| 1 packet/minute | 692.16 J | 272.122 |
| 1 packet/30 min | 35.4716 | 21.4703 |
| 1 packet/hour | 24.1464 | 17.1457 |
| 1 packet/6 h | 14.6801 | 13.5133 |
| 1 packet/12 h | 13.6992 | 13.1158 |
| 1 packet/24 h | 13.1527 | 12.8611 |
| 1 packet/7 days | 10.992 | 10.9531 |
| 1 packet/15 days | 10.6205 | 10.6001 |
Transceiver Operation Comparison with Existing Session Key Mechanisms.
| Session Key Mechanisms | Number of Transceiver |
|---|---|
| An enhanced key management scheme for LoRaWAN [ | 5 |
| A Dual Key-Based Activation Scheme for Secure | 2 |
| LoRaWAN OTA Activation [ | 2 |
| Proposed Session Key Mechanism | 1 |