IEEE Access (Jan 2022)

Securing End-Node to Gateway Communication in LoRaWAN With a Lightweight Security Protocol

  • Jhonattan J. Barriga,
  • Sang Guun Yoo

DOI
https://doi.org/10.1109/ACCESS.2022.3204005
Journal volume & issue
Vol. 10
pp. 96672 – 96694

Abstract

Read online

The arrival of IoT has brought constant innovation. This innovation has allowed many “things” (sensors, wearable devices, smart appliances, among others) to be connected to the Internet to deliver the information they collect. This need for connection has set the tone for the development of new protocols that adapt to the IoT environment, taking into consideration low energy consumption and low computational cost. These protocols are known as Low Power Wide Area Network (LPWAN). In this context, one of the most used is LoRaWAN. As many other IoT protocols, it is exposed to security threats. These threats aim to compromise security principles like confidentiality, integrity and availability (CIA Triad) of the information. This paper aims to analyze weaknesses related to gateways within LoRaWAN infrastructure to propose a lightweight security protocol to address gateway authentication vulnerabilities. This protocol uses lightweight cryptographic functions to achieve this goal as it is intended to be deployed over IoT devices which are very limited in terms of hardware and power resources. Likewise, this protocol has gone through a formal security analysis with the use of BAN-Logic and a tool called Scyther, to validate the security of the proposed protocol.

Keywords