Secure session key generation method for LoRaWAN servers

KL Tsai, FY Leu, LL Hung, CY Ko - IEEE Access, 2020 - ieeexplore.ieee.org
In recent years, Internet of Things (IoT) as an essential infrastructure for industrial
development, environmental protection and human life enhancement has attracted …

A Dual Key‐Based Activation Scheme for Secure LoRaWAN

J Kim, JS Song - Wireless Communications and Mobile …, 2017 - Wiley Online Library
With the advent of the Internet of Things (IoT) era, we are experiencing rapid technological
progress. Billions of devices are connected to each other, and our homes, cities, hospitals …

A secure and LoRaWAN compatible user authentication protocol for critical applications in the IoT environment

A Jabbari, JB Mohasefi - IEEE Transactions on Industrial …, 2021 - ieeexplore.ieee.org
Security and privacy are two main concerns in the critical applications in the Internet of
Things environments. Long Range Wide Area Network (LoRaWAN) is a protocol, which …

REALISE-IoT: RISC-V Based Efficient and Lightweight Public-Key System for IoT Applications

G Mao, Y Liu, W Dai, G Li, Z Zhang… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
LoRa is a promising choice for deploying an IoT network due to its lightweight feature and
the extensive support by LoRa Alliance. However, as a fundamental part of LoRa, the typical …

An enhanced key management scheme for LoRaWAN

J Han, J Wang - Cryptography, 2018 - mdpi.com
The LoRaWAN is one of the new low-power wide-area network (LPWAN) standards applied
to Internet of Things (IoT) technology. The key features of LPWAN are its low power …

Mitigating Cyber Attacks in LoRaWAN via Lightweight Secure Key Management Scheme

J Qadir, I Butun, P Gastaldo, O Aiello… - IEEE Access, 2023 - ieeexplore.ieee.org
Owing to the geographically scattered end devices (EDs) in long-range wide area networks
(LoRaWAN), devices that combat challenging cyber threats and attacks are of critical …

Security of join procedure and its delegation in lorawan v1. 1

TCM Dönmez, E Nigussie - Procedia Computer Science, 2018 - Elsevier
We examine the security features of LoRaWAN v1. 1 and propose countermeasures for the
determined security problems. LoRaWAN is among the emerging wireless communication …

A key management protocol based on the hash chain key generation for securing LoRaWAN networks

SAA Hakeem, SMA El-Kader, HW Kim - Sensors, 2021 - mdpi.com
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for
securing resource-constrained Internet of Things (IoT) devices with negligible power …

Securing the LoRaWAN join procedure using blockchains

SM Danish, M Lestas, HK Qureshi, K Zhang, W Asif… - Cluster …, 2020 - Springer
LoRaWAN, part of the long range Internet of Things (IoT) technologies, is a Low Power Wide
Area (LPWA) protocol that enables communication between the battery operated resource …

A Novel Secure Root Key Updating Scheme for LoRaWANs Based on CTR_AES DRBG 128

N Hayati, K Ramli, S Windarta, M Suryanegara - IEEE Access, 2022 - ieeexplore.ieee.org
A long-range wide area network (LoRaWAN) has a weakness in terms of key management:
its root key is static, meaning that it never changes. Since all cryptographic keys are derived …