ResearchSpace

A comprehensive analysis of LoRaWAN key security models and possible attack solutions

Show simple item record

dc.contributor.author Ntshabele, K
dc.contributor.author Isong, B
dc.contributor.author Gasela, N
dc.contributor.author Abu-Mahfouz, Adnan MI
dc.date.accessioned 2023-02-26T20:28:28Z
dc.date.available 2023-02-26T20:28:28Z
dc.date.issued 2022-09
dc.identifier.citation Ntshabele, K., Isong, B., Gasela, N. & Abu-Mahfouz, A.M. 2022. A comprehensive analysis of LoRaWAN key security models and possible attack solutions. <i>Mathematics, 10(19).</i> http://hdl.handle.net/10204/12635 en_ZA
dc.identifier.issn 2227-7390
dc.identifier.uri https://doi.org/10.3390/math10193421
dc.identifier.uri http://hdl.handle.net/10204/12635
dc.description.abstract Low-Power Wide-Area Network (LPWAN) is a wireless WAN technology that connects low-powered and low-bandwidth devices with low bit rates atop Long Ranges (LoRa). It is characterized by improved scalability, wide area coverage, and low power consumption, which are beneficial to resource-constrained devices on the Internet of Things (IoT) for effective communication and security. Security in Long-Range Wide-Area Networks (LoRaWAN) widely employs Advanced Encryption Standard (AES) 128-bit symmetric encryption as the accepted security standard for a key generation that secures communication and entities. However, designing an efficient key manifestation and management model is still a challenge as different designs are based on different research objectives. To date, there is no global and well-accepted LoRaWAN security model for all applications. Thus, there is a need to continually improve the LoRaWAN security model. This paper, therefore, performed an in-depth analysis of some existing LoRaWAN key security models to identify security challenges affecting these security models and assess the strengths and weaknesses of the proposed solutions. The goal is to improve some of the existing LoRaWAN security models by analysing and bringing together several challenges that affect them. Several relevant studies were collected and analysed; the analysis shows that though there are few research works in this area, several existing LoRaWAN security models are not immune to attacks. Symmetry encryption is found to be the most used approach to manage key security due to its less computational operations. Moreover, it is possible to improve existing key security models in LPWAN with consideration of the resource constrained. Again, trusted third parties for key management were also widely used to defend against possible attacks and minimize operational complexities. We, therefore, recommend the design of lightweight and less complex LPWAN security models to sustain the lifespan of LPWAN devices. en_US
dc.format Fulltext en_US
dc.language.iso en en_US
dc.relation.uri https://www.mdpi.com/2227-7390/10/19/3421 en_US
dc.source Mathematics, 10(19) en_US
dc.subject Internet of Things en_US
dc.subject IoT en_US
dc.subject Key security en_US
dc.subject Long-Range Wide-Area Networks en_US
dc.subject LoRaWAN en_US
dc.subject Low-Power Wide-Area Network en_US
dc.subject LPWAN en_US
dc.title A comprehensive analysis of LoRaWAN key security models and possible attack solutions en_US
dc.type Article en_US
dc.description.pages 19 en_US
dc.description.note Copyright: © 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). en_US
dc.description.cluster Next Generation Enterprises & Institutions en_US
dc.description.impactarea EDT4IR Management en_US
dc.identifier.apacitation Ntshabele, K., Isong, B., Gasela, N., & Abu-Mahfouz, A. M. (2022). A comprehensive analysis of LoRaWAN key security models and possible attack solutions. <i>Mathematics, 10(19)</i>, http://hdl.handle.net/10204/12635 en_ZA
dc.identifier.chicagocitation Ntshabele, K, B Isong, N Gasela, and Adnan MI Abu-Mahfouz "A comprehensive analysis of LoRaWAN key security models and possible attack solutions." <i>Mathematics, 10(19)</i> (2022) http://hdl.handle.net/10204/12635 en_ZA
dc.identifier.vancouvercitation Ntshabele K, Isong B, Gasela N, Abu-Mahfouz AM. A comprehensive analysis of LoRaWAN key security models and possible attack solutions. Mathematics, 10(19). 2022; http://hdl.handle.net/10204/12635. en_ZA
dc.identifier.ris TY - Article AU - Ntshabele, K AU - Isong, B AU - Gasela, N AU - Abu-Mahfouz, Adnan MI AB - Low-Power Wide-Area Network (LPWAN) is a wireless WAN technology that connects low-powered and low-bandwidth devices with low bit rates atop Long Ranges (LoRa). It is characterized by improved scalability, wide area coverage, and low power consumption, which are beneficial to resource-constrained devices on the Internet of Things (IoT) for effective communication and security. Security in Long-Range Wide-Area Networks (LoRaWAN) widely employs Advanced Encryption Standard (AES) 128-bit symmetric encryption as the accepted security standard for a key generation that secures communication and entities. However, designing an efficient key manifestation and management model is still a challenge as different designs are based on different research objectives. To date, there is no global and well-accepted LoRaWAN security model for all applications. Thus, there is a need to continually improve the LoRaWAN security model. This paper, therefore, performed an in-depth analysis of some existing LoRaWAN key security models to identify security challenges affecting these security models and assess the strengths and weaknesses of the proposed solutions. The goal is to improve some of the existing LoRaWAN security models by analysing and bringing together several challenges that affect them. Several relevant studies were collected and analysed; the analysis shows that though there are few research works in this area, several existing LoRaWAN security models are not immune to attacks. Symmetry encryption is found to be the most used approach to manage key security due to its less computational operations. Moreover, it is possible to improve existing key security models in LPWAN with consideration of the resource constrained. Again, trusted third parties for key management were also widely used to defend against possible attacks and minimize operational complexities. We, therefore, recommend the design of lightweight and less complex LPWAN security models to sustain the lifespan of LPWAN devices. DA - 2022-09 DB - ResearchSpace DP - CSIR J1 - Mathematics, 10(19) KW - Internet of Things KW - IoT KW - Key security KW - Long-Range Wide-Area Networks KW - LoRaWAN KW - Low-Power Wide-Area Network KW - LPWAN LK - https://researchspace.csir.co.za PY - 2022 SM - 2227-7390 T1 - A comprehensive analysis of LoRaWAN key security models and possible attack solutions TI - A comprehensive analysis of LoRaWAN key security models and possible attack solutions UR - http://hdl.handle.net/10204/12635 ER - en_ZA
dc.identifier.worklist 26423 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record