Advertisement

Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security

  • Sarra NaouiEmail author
  • Mohamed Elhoucine Elhdhili
  • Leila Azouz Saidane
Article
  • 22 Downloads

Abstract

A smart home interconnects every object of our living space to the Internet. Based on various technologies and standards, many device suppliers propound an expanded range of devices, that are incorporated in the home environment, in order to ease the human’s life and everyday duties. Among the most promising smart home applications, we distinguish the remote services control, that requires a secure and long range communication. LoRaWAN is considered as a rising technology providing a long range and secure communication. However, some LoRaWAN security vulnerabilities have been identified in the literature. So, in this paper, we propose a novel enhanced LoRaWAN solution that we adapt to secure the smart home remote control. The security of the proposed scheme is proved using a rigorous informal security analysis and a formal security verification via Scyther tool. Also, a performance comparison proved that the proposed scheme attains both computation and communication efficiency as compared to other schemes from literature.

Keywords

Smart home LoRaWAN Security Key management 

Notes

References

  1. 1.
    Batalla, J. M., Vasilakos, A., & Gajewski, M. (2017). Secure smart homes: Opportunities and challenges. ACM Computing Surveys (CSUR), 50(5), 75.CrossRefGoogle Scholar
  2. 2.
    Naoui, S., Elhdhili, M. E., & Saidane, L. A. (2017). Lightweight enhanced collaborative key management scheme for smart home application. In 2017 International conference on high performance computing and simulation (HPCS). IEEE.Google Scholar
  3. 3.
    Lee, C., et al. (2014). Securing smart home: Technologies, security challenges, and security requirements. In 2014 IEEE conference on communications and network security (CNS). IEEE.Google Scholar
  4. 4.
    Santoso, F. K., & Vun, N. C. H. (2015). Securing IoT for smart home system. In 2015 IEEE international symposium on consumer electronics (ISCE). IEEE.Google Scholar
  5. 5.
    Aras, E., et al. (2017). Selective jamming of LoRaWAN using commodity hardware. arXiv preprint arXiv:1712.02141.
  6. 6.
    Sinha, R. S., Wei, Y., & Hwang, S.-H. (2017). A survey on LPWA technology: LoRa and NB-IoT. ICT Express, 3(1), 14–21.CrossRefGoogle Scholar
  7. 7.
    Dhillon, S. H., Huang, H., & Viswanathan, H. (2017). Wide-area wireless communication challenges for the Internet of Things. IEEE Communications Magazine, 55(2), 168–174.CrossRefGoogle Scholar
  8. 8.
    Sanchez-Iborra, R., & Cano, M.-D. (2016). State of the art in LP-WAN solutions for industrial IoT services. Sensors, 16(5), 708.CrossRefGoogle Scholar
  9. 9.
    Alliance, L. (2016). LoRaWAN specification (V1. 0.2). [2017-06-10]. https://www.lora-alliance.org/Contact.
  10. 10.
    Ingenu, C. E. O. (2016). Explains why he’s rebranding on-ramp and what it will mean for IoT users. [2016-12-07]. http://www.IoT-now.com/2015/09/14/36799-ingenuceo-explains-why-hes-rebranding-on-ramp-and-whatingenu-will-mean-for-IoT-users.
  11. 11.
    de Carvalho Silva, J., et al. (2017). LoRaWAN—A low power WAN protocol for Internet of Things: A review and opportunities. In 2017 2nd International multidisciplinary conference on computer and energy science (SpliTech). IEEE.Google Scholar
  12. 12.
    Augustin, A. (2016). A study of LoRa: Long range and low power networks for the internet of things. Sensors, 16(9), 1466.CrossRefGoogle Scholar
  13. 13.
    Yu, F., Zhu, Z., & Fan, Z. (2017). Study on the feasibility of LoRaWAN for smart city applications. In 2017 IEEE 13th International conference on wireless and mobile computing, networking and communications (WiMob). IEEE.Google Scholar
  14. 14.
    Naoui, S., Elhdhili, M.E., & Saidane, L.A. (2016). Enhancing the security of the IoT LoraWAN architecture. In International conference on performance evaluation and modeling in wired and wireless networks (PEMWN). IEEE.Google Scholar
  15. 15.
    Yang, X. (2017). LoRaWAN: Vulnerability analysis and practical exploitation. Delft University of Technology. URL: https://repository.tudelft.nl/islandora/object/uuid:87730790-6166-4424-9d82-8fe815733f1e?collection=education.
  16. 16.
    Aras, E., et al. (2017). Exploring the security vulnerabilities of LoRa. In 2017 3rd IEEE International conference on cybernetics (CYBCONF). IEEE.Google Scholar
  17. 17.
    Tomasin, S., Zulian, S., & Vangelista, L. (2017). Security analysis of LoRaWAN join procedure for Internet of Things networks. In Wireless communications and networking conference workshops (WCNCW), 2017 IEEE. IEEE.Google Scholar
  18. 18.
    Lee, J., et al. (2017). Risk analysis and countermeasure for bit-flipping attack in LoRaWAN. In 2017 International conference on information networking (ICOIN). IEEE.Google Scholar
  19. 19.
    Feichtinger, K. (2018). Enhancing the security of over-the-air-activation of LoRaWAN using a hybrid cryptosystem. International Journal of Computer Science and Network ‘Security, 18(2), 1–9.Google Scholar
  20. 20.
    Sung, W.-J., et al. (2018). Protecting end-device from replay attack on LoRaWAN. In 2018 20th International conference on advanced communication technology (ICACT). IEEE.Google Scholar
  21. 21.
    Kumar, P. (2016). Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sensors Journal, 16(1), 254–264.CrossRefGoogle Scholar
  22. 22.
    Wazid, M., et al. (2017). Secure remote user authenticated key establishment protocol for smart home environment. IEEE Transactions on Dependable and Secure Computing.  https://doi.org/10.1016/j.sysarc.2018.12.005.CrossRefGoogle Scholar
  23. 23.
    Tewari, A., & Gupta, B. B. (2017). A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. International Journal of Advanced Intelligence Paradigms, 9(2–3), 111–121.CrossRefGoogle Scholar
  24. 24.
    Cremers, C. J. F. (2008). The scyther tool: Verification, falsification, and analysis of security protocols. In International conference on computer aided verification. Springer, Berlin.Google Scholar
  25. 25.
    Elbaz, A., Abd-elaziz, M. H., & Nazmy, M. T. (2014). Analysis and verification of a key agreement protocol over cloud computing using scyther tool. International Journal of Distributed and Cloud Computing, 2(2). 1–7.Google Scholar
  26. 26.
    Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.CrossRefGoogle Scholar
  27. 27.
    Naoui, S., Elhdhili, M. E., & Saidane, L. A. (2017). Trusted third party based key management for LoraWAN architecture. In 2017 IEEE/ACS 14th international conference of computer systems and applications (AICCSA). IEEE.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.ENSI Manouba UniversityTunisTunisia

Personalised recommendations