dc.contributor.author |
Ntshabele, K
|
|
dc.contributor.author |
Isong, B
|
|
dc.contributor.author |
Gasela, N
|
|
dc.contributor.author |
Abu-Mahfouz, Adnan MI
|
|
dc.date.accessioned |
2023-01-27T06:51:40Z |
|
dc.date.available |
2023-01-27T06:51:40Z |
|
dc.date.issued |
2022-09 |
|
dc.identifier.citation |
Ntshabele, K., Isong, B., Gasela, N. & Abu-Mahfouz, A.M. 2022. A trusted security key management server in LoRaWAN: Modelling and analysis. <i>Journal of Sensor and Actuator Networks, 11(3).</i> http://hdl.handle.net/10204/12592 |
en_ZA |
dc.identifier.issn |
2224-2708 |
|
dc.identifier.uri |
https://doi.org/10.3390/jsan11030052
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/12592
|
|
dc.description.abstract |
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally accepted and resilient LoRaWAN security model is challenging. Although several security models to maximize the security efficiency in LoRaWAN exist using the trusted key server to securely manage the keys, designing an optimum LoRaWAN security model is yet to be fully realized. Therefore, in this paper, we proposed two LoRaWAN security algorithms, A and B, for a trusted key management server (TKMS) to securely manage and distribute the keys amongst the entities. Algorithm B is an enhanced version of Algorithm A, which utilizes the security shortcomings of Algorithm A. We employed two formal analysis methods in the modelling, results analysis, and verification. The Scyther security verification tool was used for algorithm modelling and analysis against all possible attacks, while BAN logic was used to prove the logical correctness of the proposed algorithms. The results indicate that BAN logic feasibly proves the model logic correctness and the security claims employed in Scyther are reliable metrics for assessing the algorithms’ security efficiency. The security claims proved that the security algorithm is more secure and reliable as no attacks were detected across all entities in the enhanced-Algorithm B, unlike in Algorithm A. Moreover, the application of hashing minimizes computation cost and time for authentication and message integrity as compared to symmetric and asymmetric encryption. However, the proposed algorithm is yet to be verified as completely lightweight. |
en_US |
dc.format |
Fulltext |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.uri |
https://www.mdpi.com/2224-2708/11/3/52 |
en_US |
dc.source |
Journal of Sensor and Actuator Networks, 11(3) |
en_US |
dc.subject |
Long-Range Wide-Area Network |
en_US |
dc.subject |
LoRaWAN |
en_US |
dc.subject |
Advanced Encryption Standard |
en_US |
dc.subject |
AES |
en_US |
dc.subject |
Algorithms |
en_US |
dc.subject |
Key security |
en_US |
dc.subject |
Security models |
en_US |
dc.subject |
Symmetric encryption |
en_US |
dc.title |
A trusted security key management server in LoRaWAN: Modelling and analysis |
en_US |
dc.type |
Article |
en_US |
dc.description.pages |
23 |
en_US |
dc.description.note |
Copyright: © 2022 by the authors. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
en_US |
dc.description.cluster |
Next Generation Enterprises & Institutions |
en_US |
dc.description.impactarea |
EDT4IR Management |
en_US |
dc.identifier.apacitation |
Ntshabele, K., Isong, B., Gasela, N., & Abu-Mahfouz, A. M. (2022). A trusted security key management server in LoRaWAN: Modelling and analysis. <i>Journal of Sensor and Actuator Networks, 11(3)</i>, http://hdl.handle.net/10204/12592 |
en_ZA |
dc.identifier.chicagocitation |
Ntshabele, K, B Isong, N Gasela, and Adnan MI Abu-Mahfouz "A trusted security key management server in LoRaWAN: Modelling and analysis." <i>Journal of Sensor and Actuator Networks, 11(3)</i> (2022) http://hdl.handle.net/10204/12592 |
en_ZA |
dc.identifier.vancouvercitation |
Ntshabele K, Isong B, Gasela N, Abu-Mahfouz AM. A trusted security key management server in LoRaWAN: Modelling and analysis. Journal of Sensor and Actuator Networks, 11(3). 2022; http://hdl.handle.net/10204/12592. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Ntshabele, K
AU - Isong, B
AU - Gasela, N
AU - Abu-Mahfouz, Adnan MI
AB - The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally accepted and resilient LoRaWAN security model is challenging. Although several security models to maximize the security efficiency in LoRaWAN exist using the trusted key server to securely manage the keys, designing an optimum LoRaWAN security model is yet to be fully realized. Therefore, in this paper, we proposed two LoRaWAN security algorithms, A and B, for a trusted key management server (TKMS) to securely manage and distribute the keys amongst the entities. Algorithm B is an enhanced version of Algorithm A, which utilizes the security shortcomings of Algorithm A. We employed two formal analysis methods in the modelling, results analysis, and verification. The Scyther security verification tool was used for algorithm modelling and analysis against all possible attacks, while BAN logic was used to prove the logical correctness of the proposed algorithms. The results indicate that BAN logic feasibly proves the model logic correctness and the security claims employed in Scyther are reliable metrics for assessing the algorithms’ security efficiency. The security claims proved that the security algorithm is more secure and reliable as no attacks were detected across all entities in the enhanced-Algorithm B, unlike in Algorithm A. Moreover, the application of hashing minimizes computation cost and time for authentication and message integrity as compared to symmetric and asymmetric encryption. However, the proposed algorithm is yet to be verified as completely lightweight.
DA - 2022-09
DB - ResearchSpace
DP - CSIR
J1 - Journal of Sensor and Actuator Networks, 11(3)
KW - Long-Range Wide-Area Network
KW - LoRaWAN
KW - Advanced Encryption Standard
KW - AES
KW - Algorithms
KW - Key security
KW - Security models
KW - Symmetric encryption
LK - https://researchspace.csir.co.za
PY - 2022
SM - 2224-2708
T1 - A trusted security key management server in LoRaWAN: Modelling and analysis
TI - A trusted security key management server in LoRaWAN: Modelling and analysis
UR - http://hdl.handle.net/10204/12592
ER -
|
en_ZA |
dc.identifier.worklist |
37159 |
en_US |