Cargando…

Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms

LoRaWAN is a low power wide area network (LPWAN) technology protocol introduced by the LoRa Alliance in 2015. It was designed for its namesake features: long range, low power, low data rate, and wide area networks. Over the years, several proposals on protocol specifications have addressed various c...

Descripción completa

Detalles Bibliográficos
Autores principales: Loukil, Slim, Fourati, Lamia Chaari, Nayyar, Anand, Chee, K.-W.-A.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9142980/
https://www.ncbi.nlm.nih.gov/pubmed/35632125
http://dx.doi.org/10.3390/s22103717
_version_ 1784715692887506944
author Loukil, Slim
Fourati, Lamia Chaari
Nayyar, Anand
Chee, K.-W.-A.
author_facet Loukil, Slim
Fourati, Lamia Chaari
Nayyar, Anand
Chee, K.-W.-A.
author_sort Loukil, Slim
collection PubMed
description LoRaWAN is a low power wide area network (LPWAN) technology protocol introduced by the LoRa Alliance in 2015. It was designed for its namesake features: long range, low power, low data rate, and wide area networks. Over the years, several proposals on protocol specifications have addressed various challenges in LoRaWAN, focusing on its architecture and security issues. All of these specifications must coexist, giving rise to the compatibility issues impacting the sustainability of this technology. This paper studies the compatibility issues in LoRaWAN protocols. First, we detail the different protocol specifications already disclosed by the LoRa Alliance in two major versions, v1.0 and v1.1. This is done through presenting two scenarios where we discuss the communication and security mechanisms. In the first scenario, we describe how an end node (ED) and network server (NS) implementing LoRaWAN v1.0 generate session security keys and exchange messages for v1.0. In the second scenario, we describe how an ED v1.1 and an NS v1.1 communicate after generating security session keys. Next, we highlight the compatibility issues between the components implementing the two different LoRaWAN Specifications (mainly v1.0 and v1.1). Next, we present two new scenarios (scenarios 3 and 4) interchanging the ED and NS versions. In scenario three, we detail how an ED implementing LoRaWAN v1.1 communicates with an NS v1.0. Conversely, in scenario four, we explain how an ED v1.0 and an NS v1.1 communicate. In all these four scenarios, we highlight the concerns with security mechanism: show security session keys are generated and how integrity and confidentiality are guaranteed in LoRaWAN. At the end, we present a comparative table of these four compatibility scenarios.
format Online
Article
Text
id pubmed-9142980
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-91429802022-05-29 Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms Loukil, Slim Fourati, Lamia Chaari Nayyar, Anand Chee, K.-W.-A. Sensors (Basel) Article LoRaWAN is a low power wide area network (LPWAN) technology protocol introduced by the LoRa Alliance in 2015. It was designed for its namesake features: long range, low power, low data rate, and wide area networks. Over the years, several proposals on protocol specifications have addressed various challenges in LoRaWAN, focusing on its architecture and security issues. All of these specifications must coexist, giving rise to the compatibility issues impacting the sustainability of this technology. This paper studies the compatibility issues in LoRaWAN protocols. First, we detail the different protocol specifications already disclosed by the LoRa Alliance in two major versions, v1.0 and v1.1. This is done through presenting two scenarios where we discuss the communication and security mechanisms. In the first scenario, we describe how an end node (ED) and network server (NS) implementing LoRaWAN v1.0 generate session security keys and exchange messages for v1.0. In the second scenario, we describe how an ED v1.1 and an NS v1.1 communicate after generating security session keys. Next, we highlight the compatibility issues between the components implementing the two different LoRaWAN Specifications (mainly v1.0 and v1.1). Next, we present two new scenarios (scenarios 3 and 4) interchanging the ED and NS versions. In scenario three, we detail how an ED implementing LoRaWAN v1.1 communicates with an NS v1.0. Conversely, in scenario four, we explain how an ED v1.0 and an NS v1.1 communicate. In all these four scenarios, we highlight the concerns with security mechanism: show security session keys are generated and how integrity and confidentiality are guaranteed in LoRaWAN. At the end, we present a comparative table of these four compatibility scenarios. MDPI 2022-05-13 /pmc/articles/PMC9142980/ /pubmed/35632125 http://dx.doi.org/10.3390/s22103717 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Loukil, Slim
Fourati, Lamia Chaari
Nayyar, Anand
Chee, K.-W.-A.
Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms
title Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms
title_full Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms
title_fullStr Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms
title_full_unstemmed Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms
title_short Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms
title_sort analysis of lorawan 1.0 and 1.1 protocols security mechanisms
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9142980/
https://www.ncbi.nlm.nih.gov/pubmed/35632125
http://dx.doi.org/10.3390/s22103717
work_keys_str_mv AT loukilslim analysisoflorawan10and11protocolssecuritymechanisms
AT fouratilamiachaari analysisoflorawan10and11protocolssecuritymechanisms
AT nayyaranand analysisoflorawan10and11protocolssecuritymechanisms
AT cheekwa analysisoflorawan10and11protocolssecuritymechanisms