Pathak Gaurav, Gutierrez Jairo, Ghobakhlou Akbar, Rehman Saeed Ur
School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland 1142, New Zealand.
College of Science and Engineering, Flinders University, Tonsley, SA 5042, Australia.
Sensors (Basel). 2022 Jul 5;22(13):5065. doi: 10.3390/s22135065.
The Internet of Things (IoT) is one of the fastest emerging technologies in the industry. It includes diverse applications with different requirements to provide services to users. Secure, low-powered, and long-range transmissions are some of the most vital requirements in developing IoT applications. IoT uses several communication technologies to fulfill transmission requirements. However, Low Powered Wide Area Networks (LPWAN) transmission standards have been gaining attention because of their exceptional low-powered and long-distance transmission capabilities. The features of LPWAN transmission standards make them a perfect candidate for IoT applications. However, the current LPWAN standards lack state-of-the-art security mechanism s because of the limitations of the IoT devices in energy and computational capacity. Most of the LPWAN standards, such as Sigfox, NB-IoT, and Weightless, use static keys for node authentication and encryption. LoRaWAN is the only LPWAN technology providing session key mechanisms for better security. However, the session key mechanism is vulnerable to replay attacks. In this paper, we propose a centralized lightweight session key mechanism for LPWAN standards using the Blom-Yang key agreement (BYka) mechanism. The security of the session key mechanism is tested using the security verification tool Scyther. In addition, an energy consumption model is implemented on the LoRaWAN protocol using the NS3 simulator to verify the energy depletion in a LoRaWAN node because of the proposed session key mechanisms. The proposed session key is also verified on the Mininet-WiFi emulator for its correctness. The analysis demonstrates that the proposed session key mechanism uses a fewer number of transmissions than the existing session key mechanisms in LPWAN and provides mechanisms against replay attacks that are possible in current LPWAN session key schemes.
物联网(IoT)是该行业中发展最快的新兴技术之一。它包括各种具有不同需求的应用程序,旨在为用户提供服务。安全、低功耗和远距离传输是开发物联网应用程序时一些最为关键的要求。物联网使用多种通信技术来满足传输需求。然而,低功耗广域网(LPWAN)传输标准因其卓越的低功耗和远距离传输能力而备受关注。LPWAN传输标准的特性使其成为物联网应用的理想选择。然而,由于物联网设备在能量和计算能力方面的限制,当前的LPWAN标准缺乏先进的安全机制。大多数LPWAN标准,如Sigfox、窄带物联网(NB-IoT)和Weightless,都使用静态密钥进行节点认证和加密。LoRaWAN是唯一一种提供会话密钥机制以提高安全性的LPWAN技术。然而,会话密钥机制容易受到重放攻击。在本文中,我们提出了一种使用布洛姆-杨密钥协商(BYka)机制的LPWAN标准集中式轻量级会话密钥机制。使用安全验证工具Scyther对会话密钥机制的安全性进行了测试。此外,使用NS3模拟器在LoRaWAN协议上实现了能耗模型,以验证由于所提出的会话密钥机制导致的LoRaWAN节点中的能量消耗。还在Mininet-WiFi模拟器上对所提出的会话密钥的正确性进行了验证。分析表明,所提出的会话密钥机制在LPWAN中比现有会话密钥机制使用的传输次数更少,并提供了针对当前LPWAN会话密钥方案中可能出现的重放攻击的机制。