Cargando…
Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach
Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Netwo...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6021899/ https://www.ncbi.nlm.nih.gov/pubmed/29874839 http://dx.doi.org/10.3390/s18061833 |
_version_ | 1783335563148918784 |
---|---|
author | Sanchez-Iborra, Ramon Sánchez-Gómez, Jesús Pérez, Salvador Fernández, Pedro J. Santa, José Hernández-Ramos, José L. Skarmeta, Antonio F. |
author_facet | Sanchez-Iborra, Ramon Sánchez-Gómez, Jesús Pérez, Salvador Fernández, Pedro J. Santa, José Hernández-Ramos, José L. Skarmeta, Antonio F. |
author_sort | Sanchez-Iborra, Ramon |
collection | PubMed |
description | Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN. |
format | Online Article Text |
id | pubmed-6021899 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-60218992018-07-02 Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach Sanchez-Iborra, Ramon Sánchez-Gómez, Jesús Pérez, Salvador Fernández, Pedro J. Santa, José Hernández-Ramos, José L. Skarmeta, Antonio F. Sensors (Basel) Article Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN. MDPI 2018-06-05 /pmc/articles/PMC6021899/ /pubmed/29874839 http://dx.doi.org/10.3390/s18061833 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Sanchez-Iborra, Ramon Sánchez-Gómez, Jesús Pérez, Salvador Fernández, Pedro J. Santa, José Hernández-Ramos, José L. Skarmeta, Antonio F. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach |
title | Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach |
title_full | Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach |
title_fullStr | Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach |
title_full_unstemmed | Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach |
title_short | Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach |
title_sort | enhancing lorawan security through a lightweight and authenticated key management approach |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6021899/ https://www.ncbi.nlm.nih.gov/pubmed/29874839 http://dx.doi.org/10.3390/s18061833 |
work_keys_str_mv | AT sancheziborraramon enhancinglorawansecuritythroughalightweightandauthenticatedkeymanagementapproach AT sanchezgomezjesus enhancinglorawansecuritythroughalightweightandauthenticatedkeymanagementapproach AT perezsalvador enhancinglorawansecuritythroughalightweightandauthenticatedkeymanagementapproach AT fernandezpedroj enhancinglorawansecuritythroughalightweightandauthenticatedkeymanagementapproach AT santajose enhancinglorawansecuritythroughalightweightandauthenticatedkeymanagementapproach AT hernandezramosjosel enhancinglorawansecuritythroughalightweightandauthenticatedkeymanagementapproach AT skarmetaantoniof enhancinglorawansecuritythroughalightweightandauthenticatedkeymanagementapproach |