Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme

نویسندگان

چکیده

Owing to the geographically scattered end devices ( EDs ) in long-range wide area networks (LoRaWAN), that combat challenging cyber threats and attacks are of critical significance. In this perspective, LoRa Alliance® is continuously evolving security LoRaWAN recently introduced a new version i.e., 1.1x featured with improvement. However, wireless nature implementation still leaves it vulnerable breaches compromise its integrity. Several problems have been pinpointed newer such as one issue key distribution 1.1 keys often pre-installed on at time manufacturing. It can introduce risks if not adequately protected or compromised before they deployed. other words, may be updated regularly, which also risks. Thus, need handled securely maintain network over-the-air firmware updates feature could challenges for distribution. This paper presents generation (KGD) mechanism exchanges root between xmlns:xlink="http://www.w3.org/1999/xlink">ED application server xmlns:xlink="http://www.w3.org/1999/xlink">AS ). The KGD protocol provides authentication by integrating Advanced Encryption Standard (AES-128) addition secure hash function known xmlns:xlink="http://www.w3.org/1999/xlink">Argon2 . proposed utilizes Elliptic-Curve Diffie-Hellman (ECDH) exchange method makes resilient threats. ECDH algorithm insecure channels is, therefore, Man-in-the-Middle (MITM) network. Therefore, validate agreement avoid adversaries, considers Elliptic Curve Digital Signature Algorithm (ECDSA) authenticates allows legitimate instances last, formal analysis using Scyther tool validates enhancement protocol.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks

Wireless mesh network (WMN) is a rapid deployed, self organized and multi-hop wireless networks. However, the wireless and distributed natures of WMN make it subject to various kinds of malicious attacks, which raise a great challenge in securing these networks. Most existing security mechanisms are based on cryptographic keys where a high degree key management services are in demand. In this p...

متن کامل

Lightweight Biometric Key Agreement Scheme for Secure Body Sensor Networks

A biometric sensor device is the potential product of the forthcoming biotechnology for real-time tracking of physiological signals to support various healthcare and medical services such as homecare medical service, prevention, diagnosis, and follow-up services. A key agreement scheme between biometric sensor devices is a fundamental requirement to support the security of the healthcare and me...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

A Lightweight Formal Analysis of a Multicast Key Management Scheme

This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure multicast. A model of this protocol is constructed in Alloy, a lightweight relational modeling language, and analyzed using the Alloy Analyzer, a fully automatic simulation and checking tool for Alloy models. In this analysis,...

متن کامل

Secure Key Management Scheme for Ami in Smart Grid

The smart grid has been introduced as the next generation power grid. Advanced Metering Infrastructure (AMI) is one of the key components in this grid. It provides bidirectional communication between consumers and management entities in the utility side. This bidirectional nature communication flow has made AMI vulnerable to various cyber attacks. So, cyber security has become an important conc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3291420