Skip to main content

Securing and Analyzing Media Signal Transfer over LoRaWAN Networks

  • Conference paper
  • First Online:
Digital Transformation, Cyber Security and Resilience (DIGILIENCE 2020)

Abstract

Low-power wide-area networks became truly popular just recently and nowadays is a subject of active research. Network coverage and cost efficiency unlock hidden power and technology capabilities. Nevertheless, there are still many concerns raised. Reliability and quality of service that can be delivered are hard to control. CIA Triade in connection to IoT networks have complications and adopting face challenges. Processing large batches of data over LPWAN complex and has bandwidth limitations on both physical and regulation layers. In this paper, we adopt an algorithm controlling the quality of service for huge batches of data transmission (based on media file examples) over LPWAN networks. We propose an approach that enables institutionalization based on Semtech LoRa controllers with well defined-predictable outputs of the system. Research various configurations and discover possible capacity limits. Proposed algorithms and practices allow the system to self-configure and optimize the amount of traffic sent over the network based on the application needs, which eventually provide the desired level of control over data integrity and availability within given technology boundaries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. T. Lourensen. https://community.arm.com/iot/b/internet-of-things/posts/endpoint-ai-the-road-to-a-trillion-intelligent-endpoints

  2. Aras, E., Ramachandran, G.S., Lawrence, P., Hughes, D.: Exploring the security vulnerabilities of LoRa. In: 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), pp. 1–6. IEEE (2017). https://doi.org/10.1109/CYBConf.2017.7985777

  3. Xu, W., Jha, S., Hu, W.: LoRa-key: secure key generation system for lora-based network. IEEE Internet Things J. 6(4), 6404–6416 (2019). https://doi.org/10.1109/JIOT.2018.2888553

    Article  Google Scholar 

  4. Xing, J., Hou, L., Zhang, K., Zheng, K.: An improved secure key management scheme for LoRa system. In: 2019 IEEE 19th International Conference on Communication Technology (ICCT), pp. 296–301. IEEE (2019). https://doi.org/10.1109/ICCT46805.2019.8947215

  5. Manoharan, A.M., Rathinasabapathy, V.: Secured communication for remote biomedical monitoring system using LoRa. Sens. Lett. 17(11), 888–897 (2019). https://doi.org/10.1166/sl.2019.4146

    Article  Google Scholar 

  6. Wiklundh, K.C.: Understanding the IoT technology LoRa and its interference vulnerability. In: 2019 International Symposium on Electromagnetic Compatibility - EMC Europe, pp. 533–538. IEEE (2019).https://doi.org/10.1109/EMCEurope.2019.887196

  7. Brazhenenko, M., Shevchenko, V., Bychkov, O., Jekov, B., Petrova, P., Kovatcheva, E.: Adopting machine learning for images transferred with LoRaWAN. Inf. Secur. Int. J. 47(2), 172–186 (2020). https://doi.org/10.11610/isij.4712

  8. HД TЗI 2.5–004–99. Кpитepiї oцiнки зaxищeнocтi iнфopмaцiї в кoмп’ютepниx cиcтeмax вiд нecaнкцioнoвaнoгo дocтyпy. Зaтвepджeнo нaк. Дeпapтaмeнтy cпeцiaльниx тeлeкoмyнiкaцiйниx cиcтeм тa зaxиcтy iнфopмaцiї CБ Укpaїни вiд “ 28 ” квiтня 1999 p. № 22 iз змiнaми

    Google Scholar 

  9. HД TЗI 2.5–005 -99. Клacифiкaцiя aвтoмaтизoвaниx cиcтeм i cтaндapтнi фyнкцioнaльнi пpoфiлi зaxищeнocтi oбpoблювaнoї iнфopмaцiї вiд нecaнкцioнoвaнoгo дocтyпy. Зaтвepджeнo нaк. Дeпapтaмeнтy cпeцiaльниx тeлeкoмyнiкaцiйниx cиcтeм тa зaxиcтy iнфopмaцiї CБ Укpa

    Google Scholar 

  10. Tolubko, V., Kurchenko, O., Shevchenko, A.: Stabilization of the functional stability of the information system by controlling the dynamics of security profiles. Mod. Inf. Secur. 3, 51–57 (2018). https://doi.org/10.31673/2409-7292.2018.035157

    Article  Google Scholar 

  11. Fahad Taha AL-Dhief and Naseer Sabri and N. M. Abdul Latiff and Nik Noordini Nik Abd. Malik and Musatafa Abbas Abbood Albader and Mazin Abed Mohammed and Rami Noori AL-Haddad and Yasir Dawood Salman and Mohd Khanapi Abd Ghani and Omar Ibrahim Obaid. Performance Comparison between TCP and UDP Protocols in Different Simulation Scenarios. Int J Eng Technol. 2018;7(4.36):172--176.]

    Google Scholar 

  12. Awang Nor, S., Alubady, R., Abduladeem, K.W.: Simulated performance of TCP, SCTP, DCCP and UDP protocols over 4G network. Proc. Comput. Sci. 111, 27 (2017). https://doi.org/10.1016/j.procs.2017.06.002

    Article  Google Scholar 

  13. Baowan, D., Cox, B.J., Hilder, T.A., Hill, J.M., Thamwattana, N.: Mathematical preliminaries. In: Modelling and Mechanics of Carbon-Based Nanostructured Materials, pp. 35–58. Elsevier (2017). https://doi.org/10.1016/B978-0-12-812463-5.00002-9

    Chapter  Google Scholar 

  14. TheThingsNetwork. The Things Network 2016 Update (2016). https://speakerdeck.com/wienke/the-things-network-2016-update.

  15. Jebril, A., Sali, A., Ismail, A., Rasid, M.: Overcoming limitations of LoRa physical layer in image transmission. Sensors. 18(10), 3257 (2018). https://doi.org/10.3390/s18103257

    Article  Google Scholar 

  16. PSNR. https://en.wikipedia.org/wiki/Peak_signal-to-noise_ratio

  17. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004). https://doi.org/10.1109/TIP.2003.819861

    Article  Google Scholar 

  18. Kirichek, R., Pham, V.D., Kolechkin, A, Al-Bahri, M., Paramonov, A.: Transfer of multimedia data via LoRa. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. ruSMART NsCC NEW2AN 2017 2017 2017. Lecture Notes in Computer Science, vol. 10531, pp. 708–720. Springer, Cham (2017). https://doi.org/10.1007/978-3319-67380-6_67

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maksym Brazhenenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Brazhenenko, M., Shevchenko, V., Bychkov, O., Petrova, P.V., Jekov, B., Kovatcheva, E. (2024). Securing and Analyzing Media Signal Transfer over LoRaWAN Networks. In: Tagarev, T., Stoianov, N. (eds) Digital Transformation, Cyber Security and Resilience. DIGILIENCE 2020. Communications in Computer and Information Science, vol 1790. Springer, Cham. https://doi.org/10.1007/978-3-031-44440-1_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-44440-1_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-44439-5

  • Online ISBN: 978-3-031-44440-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics