A Novel Session Key Update Scheme for LoRaWAN

HAYATI, Nur, WINDARTA, Susila, SURYANEGARA, Muhammad, PRANGGONO, Bernardi and RAMLI, Kalamullah (2022). A Novel Session Key Update Scheme for LoRaWAN. IEEE Access, 10, 89696-89713.

Pranggono-NovelSessionKey(VoR).pdf - Published Version
Creative Commons Attribution.

Download (3MB) | Preview
Official URL: https://ieeexplore.ieee.org/document/9863834
Open Access URL: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&ar... (Published version)
Link to published version:: https://doi.org/10.1109/access.2022.3200397


This paper proposes a novel Long-range Wide Area Network (LoRaWAN) session key updating scheme to enhance the security of LoRaWAN with cost-effective communication that provides a unique key for each communication session. The scheme consists of three sequential stages, i.e., initialization, keying material preparation, and key updating, on the basis of the truncated Photon-256 algorithm with updatable keying materials. These stages are structured by a set of novel communication protocols. To prove the uniqueness of the key, we validated its sequence bit randomness using the NIST 800-22 and ENT statistical test suites. The validation results show that the key passes all test parameters. Subsequently, the communication protocols were validated by using Scyther tools. We proved that these protocols ensure the security of the LoRaWAN key update scheme and guarantee that active interception does not occur. The analysis was performed by focusing on the security features of data confidentiality, integrity protection, mutual authentication, perfect forward secrecy, and replay attack resistance. Finally, a formal security analysis using GNY logic indicated that the overall security goals are achieved. The proposed scheme’s performance was evaluated in terms of computational cost, communication cost, and storage. The computational cost needed by the scheme is very small, indicating that there is no additional burden on the backend system. The communication cost requires less traffic than previous solutions, yet it offers more robust security for LoRaWAN by producing a new key in every communication session. The scheme needs insignificant additional storage that is considered negligible.

Item Type: Article
Additional Information: There was no data access statement present.
Uncontrolled Keywords: 08 Information and Computing Sciences; 09 Engineering; 10 Technology
Identification Number: https://doi.org/10.1109/access.2022.3200397
Page Range: 89696-89713
SWORD Depositor: Symplectic Elements
Depositing User: Symplectic Elements
Date Deposited: 05 Sep 2022 09:46
Last Modified: 12 Oct 2023 10:31
URI: https://shura.shu.ac.uk/id/eprint/30659

Actions (login required)

View Item View Item


Downloads per month over past year

View more statistics