Skip to main content

Secure Energy Constrained LoRa Mesh Network

  • Conference paper
  • First Online:
Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW 2020)

Abstract

LoRa (Long Range) is a low-power wide-area network technology well-suited for Internet of Things (IoT) applications. In this paper, LoRa is used in a cattle monitoring application where an ad-hoc mesh network is configured to collect GPS and accelerometer data from cattle-worn sensors and relay the collected data to a base station. Free-range cattle monitoring is a challenging application since the battery-powered sensors must be small and energy efficient, and enable data communications over long distances from unpredictable locations. We propose novel changes to the existing LoRa mesh network protocols that minimize energy consumption by using global time synchronization enabled by GPS sensors and a concurrent transmission property unique to LoRa. The mesh routing phase efficiently occurs during every data collection period, making this approach ideal for networking highly mobile sensors. We integrate efficient authentication and encryption techniques in the data exchange operations to prevent spoofing and to provide confidentiality in the message exchanges between the sensors and the base station. The performance of the proposed secure implementation is compared to an equivalent insecure implementation. Multiple cattle distribution scenarios are constructed and compared to evaluate the energy consumption of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mekki, K., Bajic, E., Chaxel, F., Meyer, F.: A comparative study of LPWAN technologies for large-scale IoT deployment. ICT express 5(1), 1–7 (2019)

    Google Scholar 

  2. SX1276, L.: 77/78/79 datasheet, rev. 4 (2015)

    Google Scholar 

  3. Sarker, V., Queralta, J.P., Gia, T., Tenhunen, H., Westerlund, T.: A survey on LoRa for IoT: integrating edge computing. In: 2019 4th International Conference on Fog and Mobile Edge Computing (FMEC), pp. 295–300. IEEE (2019)

    Google Scholar 

  4. Hossain, E., Leung, K.K.: Wireless Mesh Networks: Architectures and Protocols. Springer, New York (2007). https://doi.org/10.1007/978-0-387-68839-8

    Book  Google Scholar 

  5. Cilfone, A., Davoli, L., Belli, L., Ferrari, G.: Wireless mesh networking: an IoT-oriented perspective survey on relevant technologies. Future Internet 11(4), 99 (2019)

    Google Scholar 

  6. Ebi, C., Schaltegger, F., Rüst, A., Blumensaat, F.: Synchronous LoRa mesh network to monitor processes in underground infrastructure. IEEE Access 7, 57663–57677 (2019)

    Google Scholar 

  7. Lundell, D., Hedberg, A., Nyberg, C., Fitzgerald, E.: A routing protocol for LoRa mesh networks. In: IEEE 19th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 14–19. IEEE (2018)

    Google Scholar 

  8. Lee, H.C., Ke, K.H.: Monitoring of large-area IoT sensors using a LoRa wireless mesh network system: design and evaluation. IEEE Trans. Instrum. Meas. 67(9), 1–11 (2018)

    Google Scholar 

  9. Bor, M.C., Roedig, U., Voigt, T., Alonso, J.M.: Do LoRa low-power wide-area networks scale? In: Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 59–67. ACM (2016)

    Google Scholar 

  10. Liao, C.H., Zhu, G., Kuwabara, D., Suzuki, M., Morikawa, H.: Multi-hop LoRa networks enabled by concurrent transmission. IEEE Access 5, 21430–21446 (2017)

    Google Scholar 

  11. Velde, B.: Multi-hop lorawan: including a forwarding node (2017)

    Google Scholar 

  12. Dias, J., Grilo, A.: Lorawan multi-hop uplink extension. Procedia Comput. Sci. 130, 424–431 (2018)

    Google Scholar 

  13. Roper: Revolutionizing beef production. https://www.ropertag.com/

    Google Scholar 

  14. Skorobogatov, S.: Flash memory bumping attacks. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 158–172. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15031-9_11

    Chapter  Google Scholar 

  15. Zhou, Y., Feng, D.: Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing. IACR Cryptol. ePrint Arch. 2005, 388 (2005)

    Google Scholar 

Download references

Acknowledgments

We would like to thank Kevin Nichols for the support and Mike Partridge for the motivation. Sandia National Laboratories is a multi-mission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC, a wholly-owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-NA-0003525. The research of Dr. Eirini Eleni Tsiropoulou was conducted as part of NSF CRII-1849739.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Derek Heeger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Heeger, D., Garigan, M., Tsiropoulou, E.E., Plusquellic, J. (2020). Secure Energy Constrained LoRa Mesh Network. In: Grieco, L.A., Boggia, G., Piro, G., Jararweh, Y., Campolo, C. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2020. Lecture Notes in Computer Science(), vol 12338. Springer, Cham. https://doi.org/10.1007/978-3-030-61746-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-61746-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-61745-5

  • Online ISBN: 978-3-030-61746-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics