Skip to main content

LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server

  • Conference paper
  • First Online:
Mobile Internet Security (MobiSec 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1121))

Included in the following conference series:

  • 297 Accesses

Abstract

With the development of Internet of Things (IoT), various communication protocols are created to support long range, low cost and low power consumption network environment. The LoRaWAN developed by LoRa Alliance is one of them. The LoRa Alliance Technical Committee proposed LoRaWAN specification version 1.1 to detail message communication structure in each network layer and to enhance network security. The network server in LoRaWAN specification version 1.0 is divided into three in version 1.1, i.e., home network server, serving network server, and forwarding network server. However, the security among these three network servers is not specified in LoRaWAN specification. In this paper, a secure session keys establish method, named network Server Session Keys Establish (SSKE) method, is proposed to generate multiple session keys for three different types of network servers so that they can communicate with each other by using these session keys. With the assistance of join server, the key establish process employs the elliptic curve cryptography, two-dimensional operations, and time keys, to exchange their session keys. The SSKE not only effectively hides important encryption parameters, but also achieves fully mutual authentication among three servers. Security analysis shows that the SSKE can resist known-key, impersonation, replay, eavesdropping, and forgery attacks. Moreover, the SSKE generates 40 session keys in a key establish process, meaning the proposed protocol can support 40 sessions simultaneously.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gaur, A., Scotney, B., Parr, G., McClean, S.: Smart city architecture and its applications based on IoT. Proc. Comput. Sci. 52, 1089–1094 (2015)

    Article  Google Scholar 

  2. Shih, C.-S., Chou, J.-J., Lin, K.-J.: WuKong: Secure Run-Time environment and data-driven IoT applications for Smart Cities and Smart Buildings. J. Internet Serv. Inf. Secur. 8(2), 1–17 (2018)

    Google Scholar 

  3. Chekired, D.A., Khoukhi, L., Mouftah, H.T.: Industrial IoT data scheduling based on hierarchical fog computing: a key for enabling smart factory. IEEE Trans. Industr. Inf. 14(10), 4590–4602 (2018)

    Article  Google Scholar 

  4. Flore, D.: 3GPP Standards for the Internet-of-Things, Recuperado el 25 (2016)

    Google Scholar 

  5. Lora-alliance. https://www.lora-alliance.org. Accessed 15 Aug 2019

  6. Sigfox. https://www.sigfox.com. Accessed 15 Aug 2019

  7. Telensa. http://www.telensa.com. Accessed 15 Aug 2019

  8. Weightless. http://www.weightless.org. Accessed 15 Aug 2019

  9. LoRa Alliance Technical Committee: LoRaWAN Backend Interfaces 1.0 Specification. LoRa Alliance (2017)

    Google Scholar 

  10. LoRa Alliance Technical Committee: LoRaWAN 1.1 Specification. LoRa Alliance (2017)

    Google Scholar 

  11. Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (2001)

    Google Scholar 

  12. Korzhuk, V., Groznykh, A., Menshikov, A., Strecker, M.: Identification of attacks against wireless sensor networks based on behaviour analysis graphics processing units. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. 10(2), 1–21 (2019)

    Google Scholar 

  13. Gritti, C., Önen, M., Molva, R., Susilo, W., Plantard, T.: Device identification and personal data attestation in networks. J. Wirel. Mob. Netw. Ubiquit. Comput. Depend. Appl. 9(4), 1–25 (2018)

    Google Scholar 

  14. Kotenko, I., Saenko, I., Branitskiy, A.: Applying big data processing and machine learning methods for mobile Internet of Things security monitoring. J. Internet Serv. Inf. Secur. 8(3), 54–63 (2018)

    Google Scholar 

  15. Hui, H., et al.: Survey on blockchain for Internet of Things. J. Internet Serv. Inf. Secur. 9(2), 1–30 (2019)

    Google Scholar 

  16. Butun, I., Pereira, N., Gidlund, M.: Security risk analysis of LoRaWAN and future directions. Fut. Internet 11(1), 1–22 (2019). Article ID 3

    Google Scholar 

  17. Miller R.: LoRa Security – Building a Secure LoRa Solution. MWR Labs, Whitepaper (2016)

    Google Scholar 

  18. You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.: An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18(6), 1–32 (2018). Article ID 1888

    Article  Google Scholar 

  19. Sanchez-Iborra, R., et al.: Enhancing LoRaWAN security through a lightweight and authenticated key management approach. Sensors 18(6), 1–18 (2018). Article ID 1833

    Article  Google Scholar 

  20. Hayati, N., Suryanegara, M., Ramli, K., Suryanto, Y.: Potential development of AES-128-bit key generation for LoRaWAN security. In: International Conference on Communication Engineering and Technology Proceedings, Nagoya, Japan, pp. 57–61 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kun-Lin Tsai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tsai, KL., Leu, FY., Yang, LC., Li, C., Liu, JY. (2020). LoRaWAN Network Server Session Keys Establish Method with the Assistance of Join Server. In: You, I., Chen, HC., Leu, FY., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2019. Communications in Computer and Information Science, vol 1121. Springer, Singapore. https://doi.org/10.1007/978-981-15-9609-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9609-4_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9608-7

  • Online ISBN: 978-981-15-9609-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics