Cargando…

A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks

Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption. The Long Range Wide Area Network (LoRaWAN) is a low power communication protocol that supports message authentication,...

Descripción completa

Detalles Bibliográficos
Autores principales: Hakeem, Shimaa A. Abdel, El-Kader, Sherine M. Abd, Kim, HyungWon
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8433778/
https://www.ncbi.nlm.nih.gov/pubmed/34502729
http://dx.doi.org/10.3390/s21175838
_version_ 1783751439756034048
author Hakeem, Shimaa A. Abdel
El-Kader, Sherine M. Abd
Kim, HyungWon
author_facet Hakeem, Shimaa A. Abdel
El-Kader, Sherine M. Abd
Kim, HyungWon
author_sort Hakeem, Shimaa A. Abdel
collection PubMed
description Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption. The Long Range Wide Area Network (LoRaWAN) is a low power communication protocol that supports message authentication, integrity, and encryption using two-session preshared secret keys. However, although the LoRaWAN supports some security functions, it suffers from session key generation and key update problems. This motivates us to introduce a new key management protocol that resolves the LoRaWAN problems and supports key updates. The proposed protocol is based on hash chain generation using a one-way hash function. Network entities share a common hash chain of n key elements to allow using a unique signing key per message. We also propose a salt hashing algorithm that encrypts the original keys into a different form to avoid the physical attacks at the end device side. We analyzed the proposed key generation performance in terms of the computation time, the required storage, and the communication overhead. We implemented and tested the proposed key generation protocol using the NS-3 network simulator. The proposed lightweight key generation protocol significantly enhances the security of the original LoRaWAN at a negligible overhead. The proposed protocol reduces the power consumption and transmission time by two times compared with some previous protocols. In addition, the proposed key generation protocol can resist attacks, such as key compromising attacks and replay attacks, and it supports the Perfect Forward Secrecy, which was not supported by LoRaWAN.
format Online
Article
Text
id pubmed-8433778
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-84337782021-09-12 A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks Hakeem, Shimaa A. Abdel El-Kader, Sherine M. Abd Kim, HyungWon Sensors (Basel) Article Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption. The Long Range Wide Area Network (LoRaWAN) is a low power communication protocol that supports message authentication, integrity, and encryption using two-session preshared secret keys. However, although the LoRaWAN supports some security functions, it suffers from session key generation and key update problems. This motivates us to introduce a new key management protocol that resolves the LoRaWAN problems and supports key updates. The proposed protocol is based on hash chain generation using a one-way hash function. Network entities share a common hash chain of n key elements to allow using a unique signing key per message. We also propose a salt hashing algorithm that encrypts the original keys into a different form to avoid the physical attacks at the end device side. We analyzed the proposed key generation performance in terms of the computation time, the required storage, and the communication overhead. We implemented and tested the proposed key generation protocol using the NS-3 network simulator. The proposed lightweight key generation protocol significantly enhances the security of the original LoRaWAN at a negligible overhead. The proposed protocol reduces the power consumption and transmission time by two times compared with some previous protocols. In addition, the proposed key generation protocol can resist attacks, such as key compromising attacks and replay attacks, and it supports the Perfect Forward Secrecy, which was not supported by LoRaWAN. MDPI 2021-08-30 /pmc/articles/PMC8433778/ /pubmed/34502729 http://dx.doi.org/10.3390/s21175838 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Hakeem, Shimaa A. Abdel
El-Kader, Sherine M. Abd
Kim, HyungWon
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
title A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
title_full A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
title_fullStr A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
title_full_unstemmed A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
title_short A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
title_sort key management protocol based on the hash chain key generation for securing lorawan networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8433778/
https://www.ncbi.nlm.nih.gov/pubmed/34502729
http://dx.doi.org/10.3390/s21175838
work_keys_str_mv AT hakeemshimaaaabdel akeymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks
AT elkadersherinemabd akeymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks
AT kimhyungwon akeymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks
AT hakeemshimaaaabdel keymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks
AT elkadersherinemabd keymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks
AT kimhyungwon keymanagementprotocolbasedonthehashchainkeygenerationforsecuringlorawannetworks