scholarly journals A Complete Key Management Scheme for LoRaWAN v1.1

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 2962
Author(s):  
Xingda Chen ◽  
Margaret Lech ◽  
Liuping Wang

Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications. The latest LoRaWAN release v.1.1 has provided a security framework that includes data confidentiality protection, data integrity check, device authentication and key management. However, its key management part is only ambiguously defined. In this paper, a complete key management scheme is proposed for LoRaWAN. The scheme addresses key updating, key generation, key backup, and key backward compatibility. The proposed scheme was shown not only to enhance the current LoRaWAN standard, but also to meet the primary design consideration of LoRaWAN, i.e., low power consumption.

2019 ◽  
Vol 94 ◽  
pp. 101948 ◽  
Author(s):  
Yasmine Harbi ◽  
Zibouda Aliouat ◽  
Allaoua Refoufi ◽  
Saad Harous ◽  
Abdelhak Bentaleb

Author(s):  
Abdelhamid Helali ◽  
Amina Msolli ◽  
Hassen Maaref ◽  
Ridha Mghaieth

Wireless sensor networks (WSNs) have attracted a lot of interests over last years in security to ensure integrity, authenticity and data confidentiality. WSN applications are numerous, which range from smart home in indoor deployment offices to smart agriculture in outdoor deployments. Due to the deployment of nodes in remote areas, the solution brought to the wireless sensor network to increase the information security consists in protecting the messages exchanged between nodes. In the paper, modifications in the key management scheme are presented. Due to resource constraints in the sensor nodes, the proposed scheme ensures a distribution of the secured keys between nodes. New session keys transmitted between sensor nodes are defined during the discovery and path key phases. The experimental results prove that the proposed scheme is adapted to the WSN applications in terms of connectivity and resiliency.


2013 ◽  
Vol 2 (2) ◽  
pp. 23-31
Author(s):  
Sufyan T. Faraj Al-janabi ◽  
Ali J. Dawood ◽  
Ekram H. Hassan

2010 ◽  
Vol 21 (3) ◽  
pp. 516-527 ◽  
Author(s):  
Ting YUAN ◽  
Jian-Qing MA ◽  
Yi-Ping ZHONG ◽  
Shi-Yong ZHANG

Author(s):  
Tong Chen ◽  
Lei Zhang ◽  
Kim-Kwang Raymond Choo ◽  
Rui Zhang ◽  
Xinyu Meng

Sign in / Sign up

Export Citation Format

Share Document