ResearchSpace

A trusted security key management server in LoRaWAN: Modelling and analysis

Show simple item record

dc.contributor.author Ntshabele, K
dc.contributor.author Isong, B
dc.contributor.author Gasela, N
dc.contributor.author Abu-Mahfouz, Adnan MI
dc.date.accessioned 2023-01-27T06:51:40Z
dc.date.available 2023-01-27T06:51:40Z
dc.date.issued 2022-09
dc.identifier.citation Ntshabele, K., Isong, B., Gasela, N. & Abu-Mahfouz, A.M. 2022. A trusted security key management server in LoRaWAN: Modelling and analysis. <i>Journal of Sensor and Actuator Networks, 11(3).</i> http://hdl.handle.net/10204/12592 en_ZA
dc.identifier.issn 2224-2708
dc.identifier.uri https://doi.org/10.3390/jsan11030052
dc.identifier.uri http://hdl.handle.net/10204/12592
dc.description.abstract The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally accepted and resilient LoRaWAN security model is challenging. Although several security models to maximize the security efficiency in LoRaWAN exist using the trusted key server to securely manage the keys, designing an optimum LoRaWAN security model is yet to be fully realized. Therefore, in this paper, we proposed two LoRaWAN security algorithms, A and B, for a trusted key management server (TKMS) to securely manage and distribute the keys amongst the entities. Algorithm B is an enhanced version of Algorithm A, which utilizes the security shortcomings of Algorithm A. We employed two formal analysis methods in the modelling, results analysis, and verification. The Scyther security verification tool was used for algorithm modelling and analysis against all possible attacks, while BAN logic was used to prove the logical correctness of the proposed algorithms. The results indicate that BAN logic feasibly proves the model logic correctness and the security claims employed in Scyther are reliable metrics for assessing the algorithms’ security efficiency. The security claims proved that the security algorithm is more secure and reliable as no attacks were detected across all entities in the enhanced-Algorithm B, unlike in Algorithm A. Moreover, the application of hashing minimizes computation cost and time for authentication and message integrity as compared to symmetric and asymmetric encryption. However, the proposed algorithm is yet to be verified as completely lightweight. en_US
dc.format Fulltext en_US
dc.language.iso en en_US
dc.relation.uri https://www.mdpi.com/2224-2708/11/3/52 en_US
dc.source Journal of Sensor and Actuator Networks, 11(3) en_US
dc.subject Long-Range Wide-Area Network en_US
dc.subject LoRaWAN en_US
dc.subject Advanced Encryption Standard en_US
dc.subject AES en_US
dc.subject Algorithms en_US
dc.subject Key security en_US
dc.subject Security models en_US
dc.subject Symmetric encryption en_US
dc.title A trusted security key management server in LoRaWAN: Modelling and analysis en_US
dc.type Article en_US
dc.description.pages 23 en_US
dc.description.note Copyright: © 2022 by the authors. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). en_US
dc.description.cluster Next Generation Enterprises & Institutions en_US
dc.description.impactarea EDT4IR Management en_US
dc.identifier.apacitation Ntshabele, K., Isong, B., Gasela, N., & Abu-Mahfouz, A. M. (2022). A trusted security key management server in LoRaWAN: Modelling and analysis. <i>Journal of Sensor and Actuator Networks, 11(3)</i>, http://hdl.handle.net/10204/12592 en_ZA
dc.identifier.chicagocitation Ntshabele, K, B Isong, N Gasela, and Adnan MI Abu-Mahfouz "A trusted security key management server in LoRaWAN: Modelling and analysis." <i>Journal of Sensor and Actuator Networks, 11(3)</i> (2022) http://hdl.handle.net/10204/12592 en_ZA
dc.identifier.vancouvercitation Ntshabele K, Isong B, Gasela N, Abu-Mahfouz AM. A trusted security key management server in LoRaWAN: Modelling and analysis. Journal of Sensor and Actuator Networks, 11(3). 2022; http://hdl.handle.net/10204/12592. en_ZA
dc.identifier.ris TY - Article AU - Ntshabele, K AU - Isong, B AU - Gasela, N AU - Abu-Mahfouz, Adnan MI AB - The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally accepted and resilient LoRaWAN security model is challenging. Although several security models to maximize the security efficiency in LoRaWAN exist using the trusted key server to securely manage the keys, designing an optimum LoRaWAN security model is yet to be fully realized. Therefore, in this paper, we proposed two LoRaWAN security algorithms, A and B, for a trusted key management server (TKMS) to securely manage and distribute the keys amongst the entities. Algorithm B is an enhanced version of Algorithm A, which utilizes the security shortcomings of Algorithm A. We employed two formal analysis methods in the modelling, results analysis, and verification. The Scyther security verification tool was used for algorithm modelling and analysis against all possible attacks, while BAN logic was used to prove the logical correctness of the proposed algorithms. The results indicate that BAN logic feasibly proves the model logic correctness and the security claims employed in Scyther are reliable metrics for assessing the algorithms’ security efficiency. The security claims proved that the security algorithm is more secure and reliable as no attacks were detected across all entities in the enhanced-Algorithm B, unlike in Algorithm A. Moreover, the application of hashing minimizes computation cost and time for authentication and message integrity as compared to symmetric and asymmetric encryption. However, the proposed algorithm is yet to be verified as completely lightweight. DA - 2022-09 DB - ResearchSpace DP - CSIR J1 - Journal of Sensor and Actuator Networks, 11(3) KW - Long-Range Wide-Area Network KW - LoRaWAN KW - Advanced Encryption Standard KW - AES KW - Algorithms KW - Key security KW - Security models KW - Symmetric encryption LK - https://researchspace.csir.co.za PY - 2022 SM - 2224-2708 T1 - A trusted security key management server in LoRaWAN: Modelling and analysis TI - A trusted security key management server in LoRaWAN: Modelling and analysis UR - http://hdl.handle.net/10204/12592 ER - en_ZA
dc.identifier.worklist 37159 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record