Cargando…
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption. The Long Range Wide Area Network (LoRaWAN) is a low power communication protocol that supports message authentication,...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8433778/ https://www.ncbi.nlm.nih.gov/pubmed/34502729 http://dx.doi.org/10.3390/s21175838 |
_version_ | 1783751439756034048 |
---|---|
author | Hakeem, Shimaa A. Abdel El-Kader, Sherine M. Abd Kim, HyungWon |
author_facet | Hakeem, Shimaa A. Abdel El-Kader, Sherine M. Abd Kim, HyungWon |
author_sort | Hakeem, Shimaa A. Abdel |
collection | PubMed |
description | Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption. The Long Range Wide Area Network (LoRaWAN) is a low power communication protocol that supports message authentication, integrity, and encryption using two-session preshared secret keys. However, although the LoRaWAN supports some security functions, it suffers from session key generation and key update problems. This motivates us to introduce a new key management protocol that resolves the LoRaWAN problems and supports key updates. The proposed protocol is based on hash chain generation using a one-way hash function. Network entities share a common hash chain of n key elements to allow using a unique signing key per message. We also propose a salt hashing algorithm that encrypts the original keys into a different form to avoid the physical attacks at the end device side. We analyzed the proposed key generation performance in terms of the computation time, the required storage, and the communication overhead. We implemented and tested the proposed key generation protocol using the NS-3 network simulator. The proposed lightweight key generation protocol significantly enhances the security of the original LoRaWAN at a negligible overhead. The proposed protocol reduces the power consumption and transmission time by two times compared with some previous protocols. In addition, the proposed key generation protocol can resist attacks, such as key compromising attacks and replay attacks, and it supports the Perfect Forward Secrecy, which was not supported by LoRaWAN. |
format | Online Article Text |
id | pubmed-8433778 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-84337782021-09-12 A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks Hakeem, Shimaa A. Abdel El-Kader, Sherine M. Abd Kim, HyungWon Sensors (Basel) Article Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption. The Long Range Wide Area Network (LoRaWAN) is a low power communication protocol that supports message authentication, integrity, and encryption using two-session preshared secret keys. However, although the LoRaWAN supports some security functions, it suffers from session key generation and key update problems. This motivates us to introduce a new key management protocol that resolves the LoRaWAN problems and supports key updates. The proposed protocol is based on hash chain generation using a one-way hash function. Network entities share a common hash chain of n key elements to allow using a unique signing key per message. We also propose a salt hashing algorithm that encrypts the original keys into a different form to avoid the physical attacks at the end device side. We analyzed the proposed key generation performance in terms of the computation time, the required storage, and the communication overhead. We implemented and tested the proposed key generation protocol using the NS-3 network simulator. The proposed lightweight key generation protocol significantly enhances the security of the original LoRaWAN at a negligible overhead. The proposed protocol reduces the power consumption and transmission time by two times compared with some previous protocols. In addition, the proposed key generation protocol can resist attacks, such as key compromising attacks and replay attacks, and it supports the Perfect Forward Secrecy, which was not supported by LoRaWAN. MDPI 2021-08-30 /pmc/articles/PMC8433778/ /pubmed/34502729 http://dx.doi.org/10.3390/s21175838 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Hakeem, Shimaa A. Abdel El-Kader, Sherine M. Abd Kim, HyungWon A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks |
title | A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks |
title_full | A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks |
title_fullStr | A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks |
title_full_unstemmed | A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks |
title_short | A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks |
title_sort | key management protocol based on the hash chain key generation for securing lorawan networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8433778/ https://www.ncbi.nlm.nih.gov/pubmed/34502729 http://dx.doi.org/10.3390/s21175838 |
work_keys_str_mv | AT hakeemshimaaaabdel akeymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks AT elkadersherinemabd akeymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks AT kimhyungwon akeymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks AT hakeemshimaaaabdel keymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks AT elkadersherinemabd keymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks AT kimhyungwon keymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks |