A Novel Session Key Update Scheme for LoRaWAN

HAYATI, Nur, WINDARTA, Susila, SURYANEGARA, Muhammad, PRANGGONO, Bernardi and RAMLI, Kalamullah (2022). A Novel Session Key Update Scheme for LoRaWAN. IEEE Access, 10, 89696-89713.

Pranggono-NovelSessionKey(VoR).pdf - Published Version
Creative Commons Attribution.

Download (3MB) | Preview
Official URL: https://ieeexplore.ieee.org/document/9863834
Open Access URL: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&ar... (Published version)
Link to published version:: https://doi.org/10.1109/access.2022.3200397
Related URLs:


    This paper proposes a novel Long-range Wide Area Network (LoRaWAN) session key updating scheme to enhance the security of LoRaWAN with cost-effective communication that provides a unique key for each communication session. The scheme consists of three sequential stages, i.e., initialization, keying material preparation, and key updating, on the basis of the truncated Photon-256 algorithm with updatable keying materials. These stages are structured by a set of novel communication protocols. To prove the uniqueness of the key, we validated its sequence bit randomness using the NIST 800-22 and ENT statistical test suites. The validation results show that the key passes all test parameters. Subsequently, the communication protocols were validated by using Scyther tools. We proved that these protocols ensure the security of the LoRaWAN key update scheme and guarantee that active interception does not occur. The analysis was performed by focusing on the security features of data confidentiality, integrity protection, mutual authentication, perfect forward secrecy, and replay attack resistance. Finally, a formal security analysis using GNY logic indicated that the overall security goals are achieved. The proposed scheme’s performance was evaluated in terms of computational cost, communication cost, and storage. The computational cost needed by the scheme is very small, indicating that there is no additional burden on the backend system. The communication cost requires less traffic than previous solutions, yet it offers more robust security for LoRaWAN by producing a new key in every communication session. The scheme needs insignificant additional storage that is considered negligible.

    Item Type: Article
    Additional Information: There was no data access statement present.
    Uncontrolled Keywords: 08 Information and Computing Sciences; 09 Engineering; 10 Technology
    Identification Number: https://doi.org/10.1109/access.2022.3200397
    Page Range: 89696-89713
    SWORD Depositor: Symplectic Elements
    Depositing User: Symplectic Elements
    Date Deposited: 05 Sep 2022 09:46
    Last Modified: 05 Sep 2022 16:15
    URI: https://shura.shu.ac.uk/id/eprint/30659

    Actions (login required)

    View Item View Item


    Downloads per month over past year

    View more statistics