Repository logo
 

LPWAN Key Exchange: A Centralised Lightweight Approach

aut.relation.endpage5065
aut.relation.issue13en_NZ
aut.relation.journalSensorsen_NZ
aut.relation.startpage5065
aut.relation.volume22en_NZ
dark.contributor.authorPathak, Gen_NZ
dark.contributor.authorGutierrez, Jen_NZ
dark.contributor.authorGhobakhlou, Aen_NZ
dark.contributor.authorRehman, SUen_NZ
dc.contributor.authorRehman, SU
dc.contributor.authorGhobakhlou, A
dc.contributor.authorGutierrez, J
dc.contributor.authorPathak, G
dc.date.accessioned2025-05-09T02:29:59Z
dc.date.available2025-05-09T02:29:59Z
dc.description.abstractThe Internet of Things (IoT) is one of the fastest emerging technologies in the industry. It includes diverse applications with different requirements to provide services to users. Secure, low-powered, and long-range transmissions are some of the most vital requirements in developing IoT applications. IoT uses several communication technologies to fulfill transmission requirements. However, Low Powered Wide Area Networks (LPWAN) transmission standards have been gaining attention because of their exceptional low-powered and long-distance transmission capabilities. The features of LPWAN transmission standards make them a perfect candidate for IoT applications. However, the current LPWAN standards lack state-of-the-art security mechanism s because of the limitations of the IoT devices in energy and computational capacity. Most of the LPWAN standards, such as Sigfox, NB-IoT, and Weightless, use static keys for node authentication and encryption. LoRaWAN is the only LPWAN technology providing session key mechanisms for better security. However, the session key mechanism is vulnerable to replay attacks. In this paper, we propose a centralized lightweight session key mechanism for LPWAN standards using the Blom–Yang key agreement (BYka) mechanism. The security of the session key mechanism is tested using the security verification tool Scyther. In addition, an energy consumption model is implemented on the LoRaWAN protocol using the NS3 simulator to verify the energy depletion in a LoRaWAN node because of the proposed session key mechanisms. The proposed session key is also verified on the Mininet-WiFi emulator for its correctness. The analysis demonstrates that the proposed session key mechanism uses a fewer number of transmissions than the existing session key mechanisms in LPWAN and provides mechanisms against replay attacks that are possible in current LPWAN session key schemes.en_NZ
dc.identifier.citationPathak, G., Gutierrez, J., Ghobakhlou, A., & Rehman, S. U. (2022). LPWAN Key Exchange: A Centralised Lightweight Approach. Sensors, 22(13), 5065. https://doi.org/10.3390/s22135065
dc.identifier.doi10.3390/s22135065en_NZ
dc.identifier.issn1424-8220en_NZ
dc.identifier.urihttp://hdl.handle.net/10292/19163
dc.languageenen_NZ
dc.publisherMDPI AGen_NZ
dc.relation.urihttps://www.mdpi.com/1424-8220/22/13/5065
dc.rights© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
dc.rights.accessrightsOpenAccessen_NZ
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.titleLPWAN Key Exchange: A Centralised Lightweight Approachen_NZ
dc.typeJournal Article
pubs.elements-id457970
pubs.organisational-data/AUT
pubs.organisational-data/AUT/Faculty of Design & Creative Technologies
pubs.organisational-data/AUT/PBRF
pubs.organisational-data/AUT/PBRF/PBRF Design and Creative Technologies
pubs.organisational-data/AUT/PBRF/PBRF Design and Creative Technologies/PBRF ECMS

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
sensors-1710928.pdf
Size:
2.07 MB
Format:
Adobe Portable Document Format
Description:
Journal article