Digital Signature Method to Overcome Sniffing Attacks on LoRaWAN Network
نویسندگان
چکیده
LoRa or Long Range with LoRaWAN technology is a protocol for low-power wireless networks. The absence of an encryption process on the data payload becomes challenge network. When sending messages running inter devices, sniffing might occur, thereby reducing confidentiality aspect communication process. This paper optimized digital signature method to secure sent by network along Advanced Encryption Standard (AES) algorithm and Ed25519 algorithm. AES was used message encryption, while purposes. aim applying signatures in this verify that original not changed during transmission ensure confidentiality. addition security mechanisms network, such as decryption, verification results, has caused some overheads. overhead usage also analyzed feasible be implemented devices. Based experimental it found there increase size memory additional processing delay deployment overall implementing devices relatively low, making possible implement widely.
منابع مشابه
Lattice Attacks on Digital Signature Schemes
We describe a lattice attack on the Digital Signature Algorithm (DSA) when used to sign many messages, mi, under the assumption that a proportion of the bits of each of the associated ephemeral keys, yi, can be recovered by alternative techniques.
متن کاملStrategies to Overcome Network Congestion in Infrastructure Systems
Networked Infrastructure systems deliver services and/or products from point to point along the network. Demand for the services provided by such systems is typically cyclic, creating inefficiencies in capacity utilization. Congestion pricing provides incentives to shift demand from peak time periods to lower demand periods. This effectively increases the capacity of the system without the need...
متن کاملA Novel Patch-Based Digital Signature
In this paper a new patch-based digital signature (DS) is proposed. The proposed approach similar to steganography methods hides the secure message in a host image. However, it uses a patch-based key to encode/decode the data like cryptography approaches. Both the host image and key patches are randomly initialized. The proposed approach consists of encoding and decoding algorithms. The encodin...
متن کاملA Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
We present a digital signature scheme based on the computational difficulty of integer factorization. The scheme possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice (where each message may be chosen in a way that depends on the signatures of previously chosen messages) cannot later forge the sign...
متن کاملDigital Forensic Implications of Collusion Attacks on the Lightning Network
The limited size of a block in the Bitcoin blockchain produces a scaling bottleneck. The transaction scalability problem can be addressed by performing smaller transactions off-chain and periodically reporting the results to the Bitcoin blockchain. One such solution is the Lightning Network. Bitcoin is employed by lawful users and criminals. This requires crimes against lawful users as well as ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of electrical and computer engineering systems
سال: 2022
ISSN: ['1847-6996', '1847-7003']
DOI: https://doi.org/10.32985/ijeces.13.7.5