IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i19p3421-d920393.html
   My bibliography  Save this article

A Comprehensive Analysis of LoRaWAN Key Security Models and Possible Attack Solutions

Author

Listed:
  • Koketso Ntshabele

    (Computer Science Department, North-West University, Mafikeng 2745, South Africa)

  • Bassey Isong

    (Computer Science Department, North-West University, Mafikeng 2745, South Africa)

  • Naison Gasela

    (Computer Science Department, North-West University, Mafikeng 2745, South Africa)

  • Adnan M. Abu-Mahfouz

    (Council for Scientific and Industrial Research (CSIR), Pretoria 0184, South Africa)

Abstract

Low-Power Wide-Area Network (LPWAN) is a wireless WAN technology that connects low-powered and low-bandwidth devices with low bit rates atop Long Ranges (LoRa). It is characterized by improved scalability, wide area coverage, and low power consumption, which are beneficial to resource-constrained devices on the Internet of Things (IoT) for effective communication and security. Security in Long-Range Wide-Area Networks (LoRaWAN) widely employs Advanced Encryption Standard (AES) 128-bit symmetric encryption as the accepted security standard for a key generation that secures communication and entities. However, designing an efficient key manifestation and management model is still a challenge as different designs are based on different research objectives. To date, there is no global and well-accepted LoRaWAN security model for all applications. Thus, there is a need to continually improve the LoRaWAN security model. This paper, therefore, performed an in-depth analysis of some existing LoRaWAN key security models to identify security challenges affecting these security models and assess the strengths and weaknesses of the proposed solutions. The goal is to improve some of the existing LoRaWAN security models by analysing and bringing together several challenges that affect them. Several relevant studies were collected and analysed; the analysis shows that though there are few research works in this area, several existing LoRaWAN security models are not immune to attacks. Symmetry encryption is found to be the most used approach to manage key security due to its less computational operations. Moreover, it is possible to improve existing key security models in LPWAN with consideration of the resource constrained. Again, trusted third parties for key management were also widely used to defend against possible attacks and minimize operational complexities. We, therefore, recommend the design of lightweight and less complex LPWAN security models to sustain the lifespan of LPWAN devices.

Suggested Citation

  • Koketso Ntshabele & Bassey Isong & Naison Gasela & Adnan M. Abu-Mahfouz, 2022. "A Comprehensive Analysis of LoRaWAN Key Security Models and Possible Attack Solutions," Mathematics, MDPI, vol. 10(19), pages 1-19, September.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:19:p:3421-:d:920393
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/19/3421/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/19/3421/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Ismail Butun & Nuno Pereira & Mikael Gidlund, 2018. "Security Risk Analysis of LoRaWAN and Future Directions," Future Internet, MDPI, vol. 11(1), pages 1-22, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.

      More about this item

      Keywords

      IoT; LoRaWAN; LPWAN; key security; attacks;
      All these keywords.

      Statistics

      Access and download statistics

      Corrections

      All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:19:p:3421-:d:920393. See general information about how to correct material in RePEc.

      If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

      If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

      If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

      For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

      Please note that corrections may take a couple of weeks to filter through the various RePEc services.

      IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.