Distributed Gateway-based Security Scheme for Guaranteeing LoRaWAN Networks Availability

被引:0
|
作者
Noura, Hassan N. [1 ]
Salman, Ola [1 ]
Chehab, Ali [1 ]
Couturier, Raphael [2 ]
机构
[1] Univ Franche Comte, FEMTO ST Inst, Belfort, France
[2] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 11072020, Lebanon
关键词
IoT; Entity availability attack; Data availability; Information Dispersal Algorithm;
D O I
10.1109/SITIS57111.2022.00016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) is interconnecting a large number of devices, some of which are constrained in terms of power and computational capability. Currently, batterypowered IoT devices are deployed in large areas, calling for power-efficient and long-range communication technologies. In this context, the Low Power Wide Area Networks (LPWAN) are considered key enablers for such IoT systems. LoRaWAN, an LPWAN technology, is one of the dominant candidates for major IoT communication protocols. Unfortunately, LoRaWAN suffers from various security and privacy issues, which may lead to several attacks on a LoRaWAN network targeting data availability, authentication, and confidentiality. In this paper, we present an effective solution to prevent data and system availability attacks at the gateway level, which is considered the weakest link in the LoRaWAN communication system. The proposed solution is intended to make the LoRaWAN communication between end devices and network servers more secure, resilient, and efficient. To ensure data availability while also reinforcing data confidentiality and integrity for LoRaWAN networks, the proposed solution utilizes the Information Dispersal Algorithm (IDA) over GF( 28) with a dynamic key derivation scheme. This solution assumes that several gateways (n) are deployed within a LoRaWAN network. The security and efficiency tests show that the proposed solution exhibits a low overhead in terms of computations, resources, and communication while offering a high degree of availability and confidentiality. Keywords- IoT; Entity availability attack; Data
引用
收藏
页码:45 / 52
页数:8
相关论文
共 50 条
  • [21] Cluster based security scheme in wireless Ad Hoc networks
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Jisuanji Yanjiu yu Fazhan, 2006, 2 (238-243):
  • [22] A group-based security scheme for wireless sensor networks
    Md. Abdul Hamid
    A. M. Jehad Sarkar
    annals of telecommunications - annales des télécommunications, 2012, 67 : 455 - 469
  • [23] A group-based security scheme for wireless sensor networks
    Hamid, Md. Abdul
    Sarkar, A. M. Jehad
    ANNALS OF TELECOMMUNICATIONS, 2012, 67 (9-10) : 455 - 469
  • [24] Cluster based security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 391 - +
  • [25] A Profile Based Scheme for Security in Clustered Wireless Sensor Networks
    Brumancia, E.
    Sylvia, A.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 823 - 827
  • [26] Lightweight security principles for distributed multimedia based sensor networks
    Kundur, D
    Zourntos, T
    Mathai, NJ
    CONFERENCE RECORD OF THE THIRTY-EIGHTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 2004, : 368 - 372
  • [27] Speed Based Distributed Congestion Control Scheme for Vehicular Networks
    Facchina, Caitlin
    Jaekel, Arunita
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 1042 - 1045
  • [28] A Wavelet Based Protection Scheme for Distribution Networks with Distributed Generation
    Shaik, Mahmood
    Rao, M. Nageswara
    Gafoor, Shaik Abdul
    2012 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ENGINEERING AND ENERGY MANAGEMENT (ICETEEEM - 2012), 2012, : 33 - 37
  • [29] A bayesian-based distributed trust management scheme for connected vehicles' security
    Rawat, Gopal Singh
    Singh, Karan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2290 - 2306
  • [30] Security on efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
    Li, JG
    Zhang, YC
    Zhu, YL
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1584 - 1586