Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security
- 22 Downloads
A smart home interconnects every object of our living space to the Internet. Based on various technologies and standards, many device suppliers propound an expanded range of devices, that are incorporated in the home environment, in order to ease the human’s life and everyday duties. Among the most promising smart home applications, we distinguish the remote services control, that requires a secure and long range communication. LoRaWAN is considered as a rising technology providing a long range and secure communication. However, some LoRaWAN security vulnerabilities have been identified in the literature. So, in this paper, we propose a novel enhanced LoRaWAN solution that we adapt to secure the smart home remote control. The security of the proposed scheme is proved using a rigorous informal security analysis and a formal security verification via Scyther tool. Also, a performance comparison proved that the proposed scheme attains both computation and communication efficiency as compared to other schemes from literature.
KeywordsSmart home LoRaWAN Security Key management
- 2.Naoui, S., Elhdhili, M. E., & Saidane, L. A. (2017). Lightweight enhanced collaborative key management scheme for smart home application. In 2017 International conference on high performance computing and simulation (HPCS). IEEE.Google Scholar
- 3.Lee, C., et al. (2014). Securing smart home: Technologies, security challenges, and security requirements. In 2014 IEEE conference on communications and network security (CNS). IEEE.Google Scholar
- 4.Santoso, F. K., & Vun, N. C. H. (2015). Securing IoT for smart home system. In 2015 IEEE international symposium on consumer electronics (ISCE). IEEE.Google Scholar
- 5.Aras, E., et al. (2017). Selective jamming of LoRaWAN using commodity hardware. arXiv preprint arXiv:1712.02141.
- 9.Alliance, L. (2016). LoRaWAN specification (V1. 0.2). [2017-06-10]. https://www.lora-alliance.org/Contact.
- 10.Ingenu, C. E. O. (2016). Explains why he’s rebranding on-ramp and what it will mean for IoT users. [2016-12-07]. http://www.IoT-now.com/2015/09/14/36799-ingenuceo-explains-why-hes-rebranding-on-ramp-and-whatingenu-will-mean-for-IoT-users.
- 11.de Carvalho Silva, J., et al. (2017). LoRaWAN—A low power WAN protocol for Internet of Things: A review and opportunities. In 2017 2nd International multidisciplinary conference on computer and energy science (SpliTech). IEEE.Google Scholar
- 13.Yu, F., Zhu, Z., & Fan, Z. (2017). Study on the feasibility of LoRaWAN for smart city applications. In 2017 IEEE 13th International conference on wireless and mobile computing, networking and communications (WiMob). IEEE.Google Scholar
- 14.Naoui, S., Elhdhili, M.E., & Saidane, L.A. (2016). Enhancing the security of the IoT LoraWAN architecture. In International conference on performance evaluation and modeling in wired and wireless networks (PEMWN). IEEE.Google Scholar
- 15.Yang, X. (2017). LoRaWAN: Vulnerability analysis and practical exploitation. Delft University of Technology. URL: https://repository.tudelft.nl/islandora/object/uuid:87730790-6166-4424-9d82-8fe815733f1e?collection=education.
- 16.Aras, E., et al. (2017). Exploring the security vulnerabilities of LoRa. In 2017 3rd IEEE International conference on cybernetics (CYBCONF). IEEE.Google Scholar
- 17.Tomasin, S., Zulian, S., & Vangelista, L. (2017). Security analysis of LoRaWAN join procedure for Internet of Things networks. In Wireless communications and networking conference workshops (WCNCW), 2017 IEEE. IEEE.Google Scholar
- 18.Lee, J., et al. (2017). Risk analysis and countermeasure for bit-flipping attack in LoRaWAN. In 2017 International conference on information networking (ICOIN). IEEE.Google Scholar
- 19.Feichtinger, K. (2018). Enhancing the security of over-the-air-activation of LoRaWAN using a hybrid cryptosystem. International Journal of Computer Science and Network ‘Security, 18(2), 1–9.Google Scholar
- 20.Sung, W.-J., et al. (2018). Protecting end-device from replay attack on LoRaWAN. In 2018 20th International conference on advanced communication technology (ICACT). IEEE.Google Scholar
- 24.Cremers, C. J. F. (2008). The scyther tool: Verification, falsification, and analysis of security protocols. In International conference on computer aided verification. Springer, Berlin.Google Scholar
- 25.Elbaz, A., Abd-elaziz, M. H., & Nazmy, M. T. (2014). Analysis and verification of a key agreement protocol over cloud computing using scyther tool. International Journal of Distributed and Cloud Computing, 2(2). 1–7.Google Scholar
- 27.Naoui, S., Elhdhili, M. E., & Saidane, L. A. (2017). Trusted third party based key management for LoraWAN architecture. In 2017 IEEE/ACS 14th international conference of computer systems and applications (AICCSA). IEEE.Google Scholar