1. Introduction
In the past few years, LoRa has become a front-runner in low-power wide-area network (LPWAN) solutions applied to low-energy/low-cost Internet of Things (IoT) transceivers and is increasingly implemented to achieve practical solutions in areas such as agro-informatics [
1], smart home design [
2] and air-quality monitoring systems [
3]. The increasing number of LoRa transceivers creates increased opportunities for malicious entities to disrupt or eavesdrop LoRa communications. Many studies have been conducted by the research community to evaluate the impact of jamming on performance and countermeasures have been proposed to tackle these threats. Below, we briefly review relevant studies that consider LoRa jamming schemes.
1.1. Previous Work on LoRa Jamming
In [
4], the authors investigated the impact of traditional jammers, such as band and tone jamming, on the LoRa demodulation process and highlighted the sub-optimal energy efficiency of these jamming schemes. Other research has considered smarter and more efficient jammers involving jamming LoRa nodes with LoRa signals. In [
5,
6,
7,
8], LoRa reactive jammers (the jamming signal is only sent on detection of an incoming legitimate LoRa signal) and random jammers with a frequency hopping scheme were implemented and assessed on real-world devices. The authors concluded that jammer efficiency is obtained if the LoRa signal detection scheme is well-designed with good detection capability, and has a latency as low as possible to align the jamming signal in time with the signal of interest. In other studies, investigation of jamming where the jammer seeks to prevent a legitimate LoRa node to access the network was considered. In [
9], a jammer was designed to reduce received signal strength indicator (RSSI) variations at the legitimate LoRa node, leading to an almost constantly obtained DevNonce key ID and preventing network access. The authors of [
10] proposed a simple jammer detection scheme based on this philosophy, while [
11,
12] evaluated the jamming impact but on the global LoRa WAN network, with, for example, gateway occupancy or dropping probability metrics.
The eavesdropping case has, however, attracted less attention by the research community. To ensure secret communications, most of the proposed solutions rely on cryptographic schemes. For example, a frequency-hopping scheme was proposed in [
13], while [
14] introduced a reduced complexity advanced encryption system (AES) solution for the key management of LoRa WAN. Finally, recently in [
15] a physical layer encryption method leveraging the randomness of the channel was presented to bypass the use of AES that imposes a burden on complexity for low-cost LoRa nodes.
1.2. Novelty and Contributions
In this paper, we propose a cooperative scheme between the transmitter and the receiver that further enhances [
15] the scheme by improving the capacity for discrete LoRa transmission. The central notion is to leverage the well-known LoRa interference impact on demodulation but constructively by spreading the useful signal energy in the frequency space with a fixed power constraint. This can be seen as self-jamming with an added layer of spectrum spreading on top of LoRa. As the receiver is cooperative, the latter can then demodulate successfully. However, in realistic conditions, time and frequency synchronization between the transmitter and the receiver must be satisfied. We therefore propose a modified and adapted version of current state-of-the-art LoRa synchronization techniques as a solution.
The key contributions of the paper are as follows:
Proposal of an enhanced scheme ensuring discrete and secure communication.
A refined current LoRa synchronization front-end.
Two variants of the scheme are proposed to adapt to power/complexity constraints of both uplinks and downlinks.
The remainder of the paper is organized as follows. In
Section 2, we introduce the system model and some LoRa modulation basics.
Section 3 presents a first approach to combatting an eavesdropper by modifying the preamble waveforms (introducing a self-jamming scheme). A modified synchronization front-end based on state-of-the-art techniques is proposed in
Section 4. In
Section 5, we investigate a possible threat where, in certain circumstances, an eavesdropper may synchronize itself. In
Section 6, we enhance our initial self-jamming solution by proposing a modified payload demodulation scheme. Finally, we provide simulation results in
Section 7 to evaluate the self-jamming method.
1.3. Notations
Table 1 lists the most relevant notations used throughout the paper.
2. System Model
2.1. Eavesdropping Scenario
We consider the eavesdropping scenario presented in
Figure 1. There are three entities, Alice, Bob and Eve, denoted with
A,
B and
E characters, respectively.
A and
B communicate with each other (Alice–Bob direction in the figure) in a cooperative way and exchange sensitive data that must be kept secret from eavesdroppers such as
E.
B has the role of the gateway and both uplink and downlink links are taken into account, depending on the
A role. If
A is a pure LoRa sensor, the uplink is much more critical than the downlink as the latter mainly consists of signaling traffic. However, if
A is an actuator driven by incoming commands from
B, for example, the downlink must be protected from
E. We are then interested in securing both up- and downlinks and also ensuring discrete communication, reducing the intercept capability of
E.
E is, in this context, a fully passive receiver located sufficiently close to
A and
B to be able to detect both
A or
B LoRa signals. In this scenario, all channels separating entities are flat with additive white Gaussian noise (AWGN) and they are assumed to be symmetric. Frequency-selective channels may be considered in the future as an extension of this study.
2.2. LoRa Modulation Overview
LoRa waveforms are a type of chirp spread spectrum (CSS) signal. These signals rely on sine waves with instantaneous frequency (IF) that vary linearly with time over the frequency range and the time range (T, the symbol period). This basic signal is called an upchirp or downchirp when IF increases or decreases with time, respectively. A Lora waveform is an M-ary digital modulation, comprised of M possible chirp modulations where the IF of the upchirp is shifted by the M possible values. The modulo operation is applied to ensure that the frequency remains in the interval . The LoRa parameters are chosen such that with and is called the spreading factor, which also corresponds to the number of bits for a LoRa symbol. In the discrete-time signal model, the chip rate () is usually used to sample the received signal, i.e., the sample period is . The signal then has M samples over one symbol period T. Each symbol is mapped to an upchirp that is temporally shifted by period. We note that a temporal shift results in a change in the initial IF.
This behavior is the heart of the
M-ary chirp modulation. An expression of discrete LoRa waveforms sampled at
(
) has been derived by the authors in [
16]:
The upchirp is the LoRa waveform with symbol index .
2.3. LoRa Demodulation Scheme
The authors of [
17] derived a simple and efficient solution to demodulate LoRa signals. In an AWGN flat-fading channel, the demodulation process is based on the maximum likelihood (ML) detection scheme. The received signal is:
with
, the complex gain of the channel and
an independent and identical distributed (i.i.d.) complex AWGN with zero-mean and variance
. The signal-to-noise ratio (SNR) is defined as:
with
the transmitted signal power and, without loss of generality, we assume
. The ML detector aims to select the frequency index
n that maximizes the scalar product
, defined as:
The demodulation stage proceeds with two simple operations:
multiply the received waveform by a downchirp (also called dechirping),
compute , the discrete Fourier transform (DFT) of , and select the discrete frequency index that maximizes .
In this way, the dechirp process merges all the signal energy into a unique frequency bin
a that can be easily retrieved by taking the magnitude (non-coherent detection) of
. The detected symbol is then:
2.4. LoRa Frame Structure
LoRa messages are transmitted in frames that follow the specific format depicted in
Figure 2.
The frame consists of a preamble followed by the payload symbols. The preamble is a critical component as it realizes the three following processes required to correctly demodulate the payload symbols:
detecting the beginning of the frame by leveraging the upchirps.
performing both frequency and time synchronization with the help of the upchirps and downchirps.
detecting if the received frame is dedicated to the receiver by checking if the consecutive network identification symbols correspond to its stored value.
LoRa transceivers generally use , a variable value, and a fixed value . The number of symbols in the preamble and the entire frame are denoted, respectively, and .
We choose to slightly change the frame format as depicted in
Figure 3 with the following modifications:
Without loss of generality, the two identification symbols and the last quarter downchirp are ignored. The latter is not leveraged in the synchronization front-end. The symbol number in the frame then becomes .
We also set the condition . This enables a balanced noise immunity between the upchirps and downchirps as these are averaged during the synchronization procedure.
The transmitted frame is then the concatenation of the upchirp, downchirp and payload symbol waveforms:
3. Combat Basic LoRa Eavesdropper with Modified Preamble Waveform
A first approach to combat E is to only modify the preamble waveforms to disrupt its synchronization. A synchronization error will irredeemably lead to a demodulation error, preventing E from obtaining the critical data. The modified preamble waveforms are also designed to considerably increase the noise sensitivity for E and, thus, the discrete capacity of the scheme, while avoiding too much degradation of the performance of the link between A and B. The cooperative receiver leverages these modifications to improve its processing gain as much as possible.
The modified DFT preamble upchirp waveform in the preamble is illustrated in
Figure 4. The green DFT bin depicts the legacy format. It consists of a unique DFT bin at known location
, containing all the signal power
. The basic idea of the discrete scheme is to spread the power over several DFT bins with a uniform distribution in respect of a fixed power constraint. This is represented by the DFT bins with a dashed line in the figure. The modified preamble can be written as:
with:
and
U, the number of DFT bins present,
, the power level of each DFT bin with
,
and
, the u-th relative delay of the preamble upchirp and downchirp, respectively. We also note
, the associated delay vector that is sorted in ascending order, i.e.,
and
. Each
delay must be unique to prevent a DFT bin overlapping issue, leading to adding DFT magnitudes and, thus, reducing the discrete capacity of the scheme. Note that
and
lead to the legacy format. The preamble downchirps follow the same structure but with
and
different from
and
to improve privacy.
Neglecting noise, the
i-th received dechirped preamble upchirp or downchirp DFT is:
Note that each DFT bin has a null imaginary part. The DFT bin locations must remain secret from
E to prevent its correct synchronization.
,
,
and
must then be random values that must be perfectly known by both
A and
B. That is, a specific procedure needs to be performed to satisfy this constraint. Possible solutions include the physical layer security schemes that leverage the randomness and reciprocity of the channel to enable both
A and
B to extract a pseudo-random bit sequence. These methods rely on the random received signal strength indicator (RSSI) variations, as LoRa transceivers have a built-in RSSI read-out feature, a solution chosen in [
15], or using random channel path phase variation [
18]. In practice, the
A and
B extracted sequences do not match perfectly and a reconciliation procedure is then necessary. This step requires the sequences exchange and may be vulnerable to eavesdroppers. The use of the Chinese remainder theorem (CRT), as in [
15], or a code-word approach as in [
19], are possible solutions to tackle this issue.
4. Self-Jamming Synchronization Front-End
In this section, we introduce desynchronizations that a receiver undergoes in practice, their effects on the LoRa demodulation, and the synchronization front-end designed to address these issues.
4.1. Time Desynchronization Model—Sampling Time Offset (STO)
In real conditions, the receiver continuously collects chunks of
M samples that are not necessarily aligned with the receiver, i.e., the sampling times are different between the transmitter and the receiver. This produces a temporal window shift
up to a symbol period
T, as depicted in
Figure 5. This effect, referred to as the sampling time offset (
STO), introduces inter-symbol interference (ISI) if the previous symbol is different from the current symbol, i.e.,
and
in the figure. The higher the value of
, the greater the ISI, with maximum signal deformation when
.
The preamble structure prevents ISI that could degrade synchronization performance, as consecutive upchirps and downchirps are identical (see Equations (
8) and (
9)).
is modeled based on the LoRa sampling frequency
and can then be converted to a certain number of sampling periods as:
with
, the integer number of sampling periods plus a fraction of a sampling period
.
denotes the rounding operation to the nearest integer.
4.2. Frequency Desynchronization Model
Due to hardware imperfections, other desynchronizations may occur in the frequency domain, such as the carrier-frequency offset (CFO) and the sampling-frequency offset (SFO).
4.2.1. Carrier-Frequency Offset (CFO)
As a reminder, the
CFO is the residual carrier frequency present in the base-band signal at the receiver side. The local oscillators of the transmitter and the receiver are not perfectly centered to the desired carrier frequency
. A residual frequency appears, then:
with
(resp.
), the carrier frequency used by the transmitter (resp. the receiver). By analogy to the
STO,
can be converted to a number of frequency bins:
with
, the integer number of DFT bins plus a fraction of a DFT bin
.
denotes the floor operation.
4.2.2. Sampling-Frequency Offset (SFO)
The
SFO is a mismatch between the current and the desired sampling frequency at the receiver side:
In hardware implementation, and especially for low-cost IoT transceivers, such as LoRa, the same oscillator is used to perform the sampling and the carrier transposition. That is, the
CFO and
SFO are generated from the same source and their relationship represented as follows [
20]:
4.3. Time and Frequency Desynchronization Effects on LoRa
and have the effect of shifting the DFT bin position (we consider for the sake of simplicity) by a certain amount that is different when considering either upchirps: or downchirps: . The fractional part and progressively spread the DFT bin of interest energy to its neighbor as or gets closer to 0.5: and for ; has the opposite behavior.
The
has the consequence, over time, of progressively distorting the received signal; a discrete model for LoRa is derived in [
21] (considering upchirp symbols, for example, neglecting noise and channel path gains):
with
, the
i-th received LoRa signal with symbol value
.
4.4. Synchronization Scheme
The adapted state-of-the-art LoRa synchronization front-end of our self-jamming scheme is presented in
Figure 6. The front-end starts with a first pre-processing block which involves sampling the received signal at an over-sampled rate
, dechirping
blocks of
M samples (downsampled by
R factor), estimating and correcting
for these
blocks, and computing the
corrected DFTs. The receiver continues with the preamble detection as, in practice, the latter operates in real time.
Once the preamble is detected, the receiver re-aligns the symbols in the detected frame by and estimates the other synchronization parameters, i.e., , , and . The estimation of both and is not trivial. As their effects are not independent of each other, the pipeline must then be designed wisely. It finally performs a frame correction to re-align itself in time and frequency. The over-sampling by the R rate is required to mitigate .
4.4.1. Fractional CFO Correction and Preamble Detection
can be estimated and compensated in this step. As the
estimator found in [
22] has low sensitivity to the presence of multiple DFT peaks and operates blindly, we choose then to use this estimator. To ensure correct
estimation, no energy other than AWGN must be present in the left and right adjacent DFT bins of each of the
U DFT peaks. We set the constraint of choosing delays with a minimal gap of
DFT positions between each. This is also valid for proper
estimation. Satisfying the constraint
, the maximum number of virtual paths
U value is:
giving
for
and
, for example. In [
22], the authors proposed an estimator that relies on the well-known three spectral lines (TSL) scheme by deriving
over
consecutive symbols. Each
received desynchronized symbol
is then corrected:
The preamble detection relies on detecting the presence of consecutive demodulated symbols. With very low AWGN and a well-aligned received signal, identical and consecutive symbols should be detected but the noise progressively introduces errors and, in practice, it is very difficult to detect this specific pattern. To improve the detection performance at the cost of an increased false alarm rate, we set the constraint to detect at least L consecutive symbols having a maximum value difference of .
Due to the presence of multiple DFT peaks of the same magnitude, the classic demodulation scheme in (
4) is not suitable as the detected DFT peak location will change over the
upchirps. To tackle this issue, we propose a cross-correlation approach. As the relative delays
are perfectly known by the receiver, the latter can rebuild locally the expected dechirped preamble upchirp with assumed transmitted power
. This is denoted
. Then, for
L consecutive received dechirped symbols, it computes the circular cross-correlation and extracts the maximum argument:
with
,
,
and
, the DFT of
. Note that
is the last block of
L demodulated symbols until preamble detection. Equation (
20) can be efficiently computed with a fast Fourier transform (FFT) algorithm as:
The preamble is detected if for and . Once the preamble is detected, the rest of the symbols in the frame are corrected by .
4.4.2. Half Fractional STO Detection
As previously stated in
Section 4.3, as
gets closer to 0.5, the neighbor DFT bin energy progressively increases, leading to higher noise sensitivity. When
, two DFT peaks with almost the same magnitude are present, creating detection uncertainty and preventing correct
and
estimation. That is,
must be mitigated before, independently from
and
. The authors in [
23] proposed a solution by performing an initial
mitigation, albeit partial, to remove this uncertainty.
We propose a different approach with a binary statistical test by detecting if . We define the hypotheses , as and , respectively. The basic idea is to evaluate the DFT magnitude difference between the peak of interest and its neighbor bin. The less the difference, the closer to 0.5 . Below a certain difference threshold, the receiver decides , otherwise . The detector is designed as follows:
The
preamble upchirp DFTs are averaged to reduce noise sensitivity:
The following cyclic cross-correlation is computed and normalized:
We extract the left and right neighbor DFT bin magnitudes of the maximum DFT peak and compute the criterion
:
is finally detected as:
The frame contaminated by is then corrected with (if detected) by discarding the first samples. There are then upchirp symbols in the preamble.
Figure 7 illustrates the evolution of averaged
, denoted
, as a function of
(
) for several SNR values
,
and
. The delays
are chosen randomly and uniformly in
and satisfying the gap
constraint.
We can see from the figure that progressively decreases as gets closer to 0.5 with the minimal point reached for . has a symmetric pattern with . The noise has the effect of flattening the curve, reducing the contrast between values. The threshold must be chosen wisely. A low value will increase the non-detection probability, a situation that must be avoided as far as possible. A very high value will lead to almost constant detection; the corrected frame will then have as many as residuals with no detection enabled.
In simulations, is a balanced value for the LoRa SNR range of interest . We note that adjacent values are almost constantly detected as , but the residual is , a value that has a negligible impact on demodulation performance.
Figure 8 illustrates the histograms of
for
,
,
and
. We note that the
statistic follows a near-Gaussian distribution as the computed cross-correlation is a sum of Rayleigh random variables (RV). With extensive simulation results, we note that this distribution is slightly
U dependent. Furthermore, increasing SF results in similar histograms but for lower SNRs, and the derived histogram for
is nearly the same as for
(symmetry).
4.4.3. CFO and STO Integer Estimation
The next step in the synchronization front-end is to estimate
and
. The process follows the same philosophy as so far applied to the cross-correlation approach. The receiver keeps the previously computed
in (
26) and performs steps (
23), (
24), (
26) for the preamble downchirps to derive
.
and
are simply derived as:
The
SFO is simply derived as:
As stated in [
23], this synchronization scheme cannot correctly detect
but, in practice, it is very unlikely to have such a high value.
4.4.4. Fractional STO Part Estimation
The final step is to estimate
in the case where
has not been detected earlier. The scheme is based on the TSL approach proposed in [
23] but with slight modifications to be functional with our self-jamming scheme. The main steps are summarized in what follows:
5. EVE Blind Synchronization Threat
With this modified preamble structure, E cannot synchronize itself correctly without the knowledge of , , and . The synchronization error heavily impacts the payload demodulation stage and then prevents E from eavesdropping. In this section, we evaluate the ability of E to blindly estimate synchronization parameters that would possibly threaten the sustainability of our scheme.
As previously stated, can be blindly estimated by both B and E. However, E cannot synchronize itself if is still present after correction, i.e., . That is, E has the ability to blindly estimate only if . This situation may happen if E is a higher-end device with low hardware impairments and, thus, .
In what follows, we present a blind method to extract . The basic idea is to leverage the fact that the introduces ISI only between the last upchirp and the first downchirp in the preamble. Then, E can use a candidate approach by computing an energy cost for each candidate and selecting the one that minimizes the cost function. We denote each candidate by . The blind extraction method is designed as follows:
This blind scheme has the drawback of being unable to correctly estimate
value, slightly increasing the
estimation error. Moreover,
progressively increases the estimation error as it gets closer to 0.5, as highlighted in
Section 7. If
E has correctly estimated
, it can easily estimate
even without
and
knowledge in (
36).
E can select the DFT bins that are above a given threshold
in
(
23) with:
The derived DFT bin positions set should correspond to and, thus, in high SNR conditions, then enabling an identical estimation performance to the legitimate receiver if . In such conditions, E successfully passes the synchronization front-end and can demodulate and retrieve the information in the payload.
We conclude that modification of the preamble only is necessary but not sufficient to ensure a discrete communication. A solution to tackle this more advanced E is then to also modify the payload waveform and is presented in the next section.
6. Combat Advanced LoRa Eavesdropper with Modified Payload Waveform
The payload waveform is modified with the same structure as for the preamble. This has the advantage of reducing scheme knowledge leaks, i.e., preamble symbols
,
, and delays
and
. The modified payload waveform is then:
with:
with
, a random shift (unknown by
E) applied to the
d-th payload symbol,
the
u-th relative delay of the
d-th payload symbol
. We note
the delay vector of the d-th payload symbol. Each
may be different between payload symbols to improve privacy. Again, the receiver may use the same legacy cross-correlation approach to demodulate the payload symbol. However, the latter has the drawback of increasing interference peak magnitudes in (
20) as
U grows. This reduces the AWGN immunity and degrades the symbol detection performance.
We propose a modified cross-correlation implementation, denoted as mod cross-corr, that considerably mitigates this detrimental effect. Considering perfect synchronization, it consists of dechirping the received symbol
over multiple downchirp symbols instead of the unique downchirp
:
The symbol is still estimated in the frequency domain:
To compare the legacy and the modified cross-correlation, we define the following criterion for the modified cross-correlation:
and for the legacy cross-correlation:
This represents the average magnitude difference between the DFT peak of interest and the interference peaks (AWGN plus cross-correlation peaks).
Figure 9 compares average
between the legacy and the modified cross-correlations as a function of
for several
. We assume perfect synchronization and delays chosen randomly, respecting the
constraint.
We can see from the figure that
has a maximum and same average
between cross-corr and mod cross-corr as it is equivalent to the LoRa legacy demodulation scheme (
4). It behaves as an upper limit as the higher average
, the higher the magnitude difference, and the better the performance. We also note that mod cross-corr has much lower
U sensitivity. The loss between
and
is
for cross-corr against
for mod cross-corr at
. This solution is only sustainable if the
STO has been correctly mitigated as would normally be the case when demodulating the payload. This modified cross-correlation is not suitable for synchronization parameter estimation as a candidate
approach is required (similar to the blind
estimation procedure) that gives poor synchronization performance.
Table 2 summarizes the parameters of our complete self-jamming scheme that the legitimate and eavesdropper receivers know, do not know, or must be kept secret from
E, estimated with self-jamming scheme knowledge and blindly estimated. The symbols used in the table are described in
Table 3. For conciseness, parameters which depend on others are not shown, e.g.,
.
Note that, from the table, the only parameter that is identically estimated by the legitimate receiver and the eavesdropper is
. Furthermore,
E can blindly estimate the
STO and retrieve
U under the right conditions (see
Section 5). However, the critical payload parameters
and
are almost impossible to retrieve for
E without using a brute-force approach, making proper demodulation very difficult.
7. Simulation Results
In this section, we present several simulation results to assess the self-jamming scheme. The following parameters are used, if not stated:
,
MHz, kHz
We assume that is very unlikely to happen in practice.
,
,
7.1. Preamble Detection Performance
As
E does not have
and
knowledge, the only possible preamble detection scheme for
E is to compute the cross-correlation between two consecutive symbols as:
with
and
.
E also searches
L consecutive symbols in
with value difference
to detect the preamble.
A and
B also have the ability to use the modified cross-correlation to improve the preamble detection performance. However, as stated in
Section 6, this approach does not demonstrate satisfactory performance if the
is not mitigated. The preamble detection can only be performed in the presence of
. That is, an
candidate approach must be leveraged with the same philosophy as the blind
estimation performed by
E (see
Section 5). To save computation resources, the candidate selection is only performed on the p-th received symbol and kept for the
remaining symbols. The modified preamble detection scheme is:
Figure 10 presents the preamble detection performance comparison between the legitimate receiver and
E as a function of
for several
and
. We also add the comparison between the legacy and the modified cross-correlation methods.
We can see from the figure that the preamble detection performance progressively decreases when U increases, even when using modified cross-correlation. This is because the same chosen candidate is used for all the symbols in the block of L received symbols. That is, increasing U increases the error probability to . This error propagates on all symbols and the probability of detecting L consecutive symbols with value difference then decreases.
For , the legacy and modified cross-correlation schemes have similar preamble detection performance, with a slight advantage for the modified cross-correlation method. However, for higher U, the modified cross-correlation scheme progressively outperforms the legacy cross-correlation scheme as U grows, with a performance difference of about 2 dB and a detection probability of 0.5 and . Note that the modified cross-correlation performance is almost the same for .
E has much lower performance with a loss ≈4 dB between
and
, with a detection probability of 0.5 and a loss ≥3 dB when compared to the legitimate receiver using the modified cross-correlation scheme, for a given
U.
E is much more prone to AWGN errors as the cross-correlation performed in (
49) has two sources containing AWGN, while the reference upchirp in (
20) is AWGN free.
7.2. Complexity Comparison between the Legacy and the Modified Cross-Correlation Methods
The considerably reduced
U sensitivity of modified cross-correlation (see
Section 6) is at the cost of increased complexity. The algorithms for both the legacy and the modified cross-correlation functions are provided in Algorithms 1 and 2.
Algorithm 1: Legacy cross-correlation algorithm |
inputs: : the i-th received symbol vector |
: the delays vector |
: the reference downchirp or upchirp vector |
M: the constellation size |
output: s: the maximum peak index of the legacy cross-correlation |
- 1
- 2
%init M-size vector - 3
- 4
- 5
return
|
It is obvious that the legacy cross-correlation in Algorithm 1 does not depend on
U; it then requires the same amount of operations irrespective of the
U. However, in Algorithm 2, lines 2–4,
U complex sums of
M elements are required. That is, increasing
U increases the complexity.
Algorithm 2: Modified cross-correlation algorithm |
|
This behavior is highlighted in
Figure 11. We execute and report the execution times of C compiled versions of Algorithms 1 and 2 in a MATLAB environment, with
.
In
Figure 11a, the mod cross-corr/legacy cross-corr execution time ratios of the preamble detection and payload demodulation processes are presented for
. We can see for
and the payload demodulation considered that mod cross-corr is about
faster than legacy cross-corr (
). Indeed, mod cross-corr with
is identical to the LoRa legacy demodulation scheme in (
4). Then, computing the legacy cross-correlation for this case adds unnecessary complexity. Equally, when
, the
candidate procedure for preamble detection presented in
Section 7.1 is useless, considerably decreasing the complexity, leading to a ratio
. Activating the necessary
candidate approach for
greatly increases the complexity cost, reflected in the high ratio transition from
0.7 to
2.8 between
to
. Increasing
U progressively increases the mod cross-corr complexity to reach a complexity increase factor of about 3 at
.
In
Figure 11b, mod cross-corr and legacy cross-corr schemes are compared to the LoRa legacy demodulation when used for the payload demodulation and preamble detection processes. We note that the burden of mod cross-corr on preamble processing is much higher than that of the payload process for low
U values but progressively reduces to reach a turnover point at
where the latter increases the advantage beyond this value. Again, the
candidate approach is responsible for the high cost value at
but shows less increasing complexity with
U. The complexity of mod cross-corr is progressively increased when
U increases to reach a factor of about 4.3 at
.
However, the cost of adding the legacy cross-correlation in the preamble section is very small with a constant ratio as the legacy cross-correlation computation does not depend on U. We also note that using legacy cross-corr for the payload demodulation has higher relative complexity (≈1.45) than for the preamble detection although its absolute complexity is much lower.
Table 4 and
Table 5 summarize the advantages and drawbacks of the legacy and mod cross-correlation schemes.
From
Table 4, we can conclude that mod cross-corr almost completely removes
U sensitivity and, thus, improves the frame detection and payload demodulation performances, but at the cost of increased complexity.
Table 5 shows the opposite behavior for legacy cross-corr, where it is more low-complexity compliant but has a high sensitivity with
U which decreases the performances. That is, using mod cross-corr for the preamble detection mainly depends on performance–complexity trade-offs.
7.3. Integer STO Part E Blind Estimation Performance
Figure 12 presents the blind
estimation performance of
E as the average estimation rate (ER) over Monte Carlo trials, defined as:
with:
The figure plots the average ER as a function of
for random
, fixed
,
, two
estimation residuals
in the cases of no AWGN and several
,
. We also add the legitimate receiver (
B in the figure) performance as a comparison where the latter has the
case detection activated (see
Section 4.4.2), for
and
.
We can see from the figure that, in a perfect estimation scenario, i.e., , the average ER degrades progressively as gets closer to 0.5. In the no AWGN case, is very good with in the worst situation . Increasing the noise power progressively decreases performance with at .
We can conclude that E only has synchronization capability for very high SNR environments, i.e., located very close to A or B for uplinks and downlinks, respectively. Interestingly, the estimation residual produces a slightly better performance in no/very low AWGN conditions, i.e., . With sufficiently low SNR, the noise finally overtakes this effect. Note that higher U values slightly reduce performance.
We also see that B has a perfect ER of 1 as the SNR value considered here is high with respect to the traditional SNR range ( usually for ) and then exhibits particularly good performance. Higher SNR values will exhibit identical performance and are not shown for the sake of figure clarity.
7.4. Legitimate Receiver SER Performance
Finally, we evaluate the legitimate receiver SER performance with a fully activated self-jamming scheme, i.e., modified preamble with complete synchronization and a modified cross-correlation method to demodulate payload symbols. The preamble is supposed to be detected already.
Figure 13 presents the SER performance of the legitimate receiver as a function of
for several
and
. We also add the maximum performance reachable as the perfectly synchronized case with no self-jamming, i.e.,
.
We can see from the figure that
exhibit very good performance with a loss lower than 0.5 dB. Increasing
U progressively degrades performance with a loss of about 3 dB for
. This can be explained by the fact that the legacy cross-correlation is still used in the synchronization front-end with its
U sensitivity (see
Section 6), but also because of
estimator limitation. If the preamble DFT peaks are too low, i.e.,
,
will not be correctly estimated in a relatively high SNR. That is, the preamble DFT averaging performed straight afterwards will not perform well;
and
will then be incorrectly estimated, leading to a payload demodulation error. However, the
value is more than sufficient to prevent
E from correct demodulating, as explained in the next section.
7.5. E Blind Payload Demodulation Ability
In this subsection, we investigate the ability of
E to blindly estimate the payload symbols with the modified payload waveform scheme (see
Section 6). We assume that
E passed the synchronization front-end successfully with the advantageous but restrained conditions
and
with low
residual, as seen in
Section 7.3. Since
is unknown by
E, the latter can only randomly choose one of the DFT magnitude bins that are above a given threshold
:
with
the DFT magnitude of the d-th payload symbol
. The set of selected DFT bins and its length are denoted with
and
, respectively. For a chance for
E to detect correctly
, the latter must be in
. We denote the probability that
as
. This necessary condition depends on the
value that also drives
. Then,
must be chosen appropriately.
Figure 14 presents the impact of
on average
(denoted as
) and
, respectively. We consider
(a value giving very good SER performance for the legitimate receiver, as seen in
Section 7.4),
,
with
estimation residual
and random
. These
values are the range in which
E exhibits very good
ER performance, as seen in
Figure 12. In the simulation,
E blindly estimates
with the scheme presented in
Section 5, and next performs the extraction of the DFT peaks with
threshold to estimate
. The estimated
STO is compensated and
E can finally proceed to the payload section of the frame.
From
Figure 14a,b, we can see that setting
leads to very low
as most of the DFT bins are selected, leading to a very high
at
. Increasing
up to 0.3 decreases
a great deal to reach a floor level
. Interestingly,
does not impact
so much with
.
exhibits relatively high
up to ≈0.6 because of the benefit of a reduced
at
and
. In this example,
is a good value to ensure high payload symbol capture in the DFT window of interest, i.e.,
and
.
Nevertheless, the demodulation brute-force complexity for
E is still prohibitively high. If we consider
, assuming that
is always in
, i.e.,
, and payload symbols number
in the frame, this leads to the frame demodulation probability (FDP) of:
For and , we have combinations and . At an optimistic speed of combination trials per second, this would require years of trials. Therefore, it prevents E from efficient correct demodulation.
8. Conclusions
In this paper, we introduced an enhanced LoRa transceiver that ensures discrete and secure communications by leveraging a simple and elegant spread spectrum philosophy. This involved first modifying the preamble LoRa waveforms to prevent eavesdropper synchronization leading to incorrect payload demodulation.
We proposed a modified synchronization scheme based on current state-of-the-art techniques that estimates and mitigates the major synchronization impairments, such as the
CFO,
SFO and
STO. We added a synchronization refinement by considering the pessimistic case
, previously identified in [
23], and proposed an approach based on a statistical test.
We also adopted the point of view of the eavesdropper by developing a blind estimation scheme. It exhibits good estimation performance provided that the SNR is much higher than the standard LoRa SNR range, the CFO is low and the received signal is well-aligned with sampling periods. Under these conditions, the eavesdropper is able to perform effective synchronization and finally retrieves the payload information. That is, modification of the preamble waveforms is necessary but not sufficient to ensure a discrete communication.
We then introduced the same modified waveform scheme to the payload but with a modified cross-correlation demodulation scheme to reduce the negative effects of the presence of multiple peaks in the LoRa DFT when using the LoRa legacy cross-correlation, at the cost of increased complexity for the legitimate receiver but much lower than that of the eavesdropper for an arbitrary small frame demodulation error. With the complete transmission scheme enabled, the SER performance loss for the legitimate receiver is less than 0.5 dB for a frequency spread factor up to at .
Table 6 summarizes the advantages and drawbacks of our LoRa self-jamming scheme. The main contribution of this scheme compared to other schemes described in the literature is the enablement of both discrete and private LoRa communications by considerably decreasing the eavesdropper’s ability to correctly identify an outgoing LoRa transmission and preventing them from proper demodulation. The potential eavesdropper will also have great difficulty in blindly synchronizing itself and collectingthe most critical system design parameters, i.e., (
U,
, etc.) will only be possible with brute-force approaches. The proposed scheme is, however, not perfect and all of the advantages described are at the cost of higher implementation complexity and SER performance loss that is, however, reasonably small.
Note that this scheme does not interfere with other LoRa physical processing such as coding (e.g., Hamming and Gray coding), whitening and interleaving processes, or with the application layers, such as higher-level encryption mechanisms and LoRaWAN architecture.
From a practical implantation perspective, this scheme would require, at minimum, software modifications of existing LoRa transceivers having higher capabilities (higher computation and memory resources). This scheme may not be suitable for all applications but rather may be used for specific applications (e.g., securing a military area) where complexity constraints are not a priority but the preservation of good AWGN LoRa resilience is desired.
This analytic investigation has generated promising results for a LoRa self-jamming scheme with an adapted synchronization procedure that capitalizes on state-of-the-art LoRa synchronization algorithms. In [
22], the authors evaluated the
,
and
estimators, as well as a variant of our
estimator with universal software radio peripheral (USRP) equipment, and obtained good synchronization performances.
However, this scheme needs to be assessed on real-world equipment. It will be of interest to evaluate the impact of this modified waveform on the different components of the hardware front-end. For example, as this scheme adds multiple LoRa waveforms that are not necessarily coherent with each other, it may result in an increase in the peak-to-average power ratio (PAPR) and, thus, lower the performance. This may be investigated, offering interesting research opportunities for the design of modified LoRa self-jamming waveforms that can mitigate potential PAPR increase.
Author Contributions
Conceptualization, C.D., R.G.; methodology, C.D., R.G. and P.R.; software, C.D.; validation, R.G., P.R.; formal analysis, C.D., R.G. and P.R.; investigation, C.D., R.G. and P.R.; resources, C.D.; data curation, C.D.; writing—original draft preparation, C.D.; writing—review and editing, C.D., R.G., P.R., G.B. and A.F.; visualization, C.D., R.G.; supervision, R.G. and P.R.; project administration, R.G.; funding acquisition, R.G. All authors have read and agreed to the published version of the manuscript.
Funding
This research is jointly supported by the IBNM (Brest Institute of Computer Science and Mathematics), CyberIoT Chair of Excellence at the University of Brest (UBO), and the Brittany region—Pôle d’Excellence Cyber.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Acknowledgments
The authors would like to thank to the University of Brest (UBO), the IBNM (Brest Institute of Computer Science and Mathematics) CyberIoT Chair of Excellence, and the Brittany region—Pôle d’Excellence Cyber for their funding.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Gehani, A.; Harsha, S.; Raghav, R.; Sarkar, M.; Paolini, C. Application of 915 MHz Band LoRa for Agro-Informatics. In Proceedings of the 2021 Wireless Telecommunications Symposium (WTS), Virtual Event, 21–23 April 2021; pp. 1–4. [Google Scholar] [CrossRef]
- Opipah, S.; Qodim, H.; Miharja, D.; Sarbini; Hamidi, E.A.Z.; Juhana, T. Prototype Design of Smart Home System Base on LoRa. In Proceedings of the 2020 6th International Conference on Wireless and Telematics (ICWT), Yogyakarta, Indonesia, 3–4 September 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Od, S.; Huang, H.H.; Wei, J.B. Apply LoRa Technology to Construct an Air Quality Monitoring IoT System. In Proceedings of the 2021 IEEE 3rd Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS), Tainan, Taiwan, 28–30 May 2021; pp. 88–91. [Google Scholar] [CrossRef]
- Demeslay, C.; Gautier, R.; Fiche, A.; Burel, G. Band & Tone Jamming Analysis and Detection on LoRa signals. arXiv 2021, arXiv:2107.07782. [Google Scholar]
- Chin-Ya, H.; Ching-Wei, L.; Ray-Guang, C.; Jay, Y.S.; Shiann-Tsong, S. Experimental Evaluation of Jamming Threat in LoRaWAN. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Aras, E.; Small, N.; Ramachandran, G.S.; Delbruel, S.; Joosen, W.; Hughes, D. Selective Jamming of LoRaWAN Using Commodity Hardware. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2017, Melbourne, Australia, 7–10 November 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 363–372. [Google Scholar] [CrossRef] [Green Version]
- Perković, T.; Rudeš, H.; Damjanović, S.; Nakić, A. Low-Cost Implementation of Reactive Jammer on LoRaWAN Network. Electronics 2021, 10, 864. [Google Scholar] [CrossRef]
- Hou, N.; Xia, X.; Zheng, Y. Jamming of LoRa PHY and Countermeasure. In Proceedings of the IEEE INFOCOM 2021—IEEE Conference on Computer Communications, Virtual, 10–13 May 2021; pp. 1–10. [Google Scholar] [CrossRef]
- Danish, S.M.; Qureshi, H.K.; Jangsher, S. Jamming Attack Analysis of Wireless Power Transfer on LoRaWAN Join Procedure. In Proceedings of the 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Danish, S.M.; Nasir, A.; Qureshi, H.K.; Ashfaq, A.B.; Mumtaz, S.; Rodriguez, J. Network Intrusion Detection System for Jamming Attack in LoRaWAN Join Procedure. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Martinez, I.; Tanguy, P.; Nouvel, F. On the performance evaluation of LoRaWAN under Jamming. In Proceedings of the 2019 12th IFIP Wireless and Mobile Networking Conference (WMNC), Paris, France, 11–13 September 2019; pp. 141–145. [Google Scholar] [CrossRef]
- Martinez, I.; Nouvel, F.; Lahoud, S.; Tanguy, P.; Helou, M.E. On the Performance Evaluation of LoRaWAN with Re-transmissions under Jamming. In Proceedings of the 2020 IEEE Symposium on Computers and Communications (ISCC), Rennes, France, 7–10 July 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Ahmar, A.U.H.; Aras, E.; Nguyen, D.T.; Michiels, S.; Joosen, W.; Hughes, D. CRAM: Robust Medium Access Control for LPWAN using Cryptographic Frequency Hopping. In Proceedings of the 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS), Marina del Rey, CA, USA, 25–27 May 2020; pp. 95–102. [Google Scholar] [CrossRef]
- Tsai, K.L.; Leu, F.Y.; You, I.; Chang, S.W.; Hu, S.J.; Park, H. Low-Power AES Data Encryption Architecture for a LoRaWAN. IEEE Access 2019, 7, 146348–146357. [Google Scholar] [CrossRef]
- Zhang, C.; Yue, J.; Jiao, L.; Shi, J.; Wang, S. A Novel Physical Layer Encryption Algorithm for LoRa. IEEE Commun. Lett. 2021, 25, 2512–2516. [Google Scholar] [CrossRef]
- Chiani, M.; Elzanaty, A. On the LoRa Modulation for IoT: Waveform Properties and Spectral Analysis. IEEE Internet Things J. 2019, 6, 8463–8470. [Google Scholar] [CrossRef] [Green Version]
- Vangelista, L. Frequency Shift Chirp Modulation: The LoRa Modulation. IEEE Signal Process. Lett. 2017, 24, 1818–1821. [Google Scholar] [CrossRef]
- Qian, W.; Hai, S.; Kui, R.; Kwangjo, K. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In Proceedings of the 2011 Proceedings IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 1422–1430. [Google Scholar] [CrossRef]
- Zhang, J.; Duong, T.Q.; Marshall, A.; Woods, R. Key Generation From Wireless Channels: A Review. IEEE Access 2016, 4, 614–626. [Google Scholar] [CrossRef] [Green Version]
- Bernier, C.; Dehmas, F.; Deparis, N. Low Complexity LoRa Frame Synchronization for Ultra-Low Power Software-Defined Radios. IEEE Trans. Commun. 2020, 68, 3140–3152. [Google Scholar] [CrossRef] [Green Version]
- Ghanaatian, R.; Afisiadis, O.; Cotting, M.; Burg, A. Lora Digital Receiver Analysis and Implementation. In Proceedings of the ICASSP 2019—2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 12–17 May 2019; pp. 1498–1502. [Google Scholar] [CrossRef]
- Tapparel, J.; Afisiadis, O.; Mayoraz, P.; Balatsoukas-Stimming, A.; Burg, A. An Open-Source LoRa Physical Layer Prototype on GNU Radio. In Proceedings of the 2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Atlanta, GA, USA, 26–29 May 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Xhonneux, M.; Orion, A.; Bol, D.; Louveaux, J. A Low-Complexity LoRa Synchronization Algorithm Robust to Sampling Time Offsets. IEEE Internet Things J. 2021, 9, 3756–3769. [Google Scholar] [CrossRef]
Figure 1.
The eavesdropping scenario.
Figure 1.
The eavesdropping scenario.
Figure 2.
The legacy LoRa frame format.
Figure 2.
The legacy LoRa frame format.
Figure 3.
The modified self-jamming LoRa frame format.
Figure 3.
The modified self-jamming LoRa frame format.
Figure 4.
The modified preamble upchirp waveform.
Figure 4.
The modified preamble upchirp waveform.
Figure 5.
Illustration of the STO effect.
Figure 5.
Illustration of the STO effect.
Figure 6.
Illustration of the LoRa synchronization front-end adapted to the self-jamming scheme.
Figure 6.
Illustration of the LoRa synchronization front-end adapted to the self-jamming scheme.
Figure 7.
Evolution of the average value of the criterion as a function of for several SNR values , and .
Figure 7.
Evolution of the average value of the criterion as a function of for several SNR values , and .
Figure 8.
histograms as a function of for , and .
Figure 8.
histograms as a function of for , and .
Figure 9.
U sensitivity comparison between the legacy and the modified cross-correlation schemes, .
Figure 9.
U sensitivity comparison between the legacy and the modified cross-correlation schemes, .
Figure 10.
Preamble detection performance comparison between B and E for , and . B can use both the legacy and the modified cross-correlation methods, while E is restricted to blindly detecting the preamble with the legacy cross-correlation scheme only.
Figure 10.
Preamble detection performance comparison between B and E for , and . B can use both the legacy and the modified cross-correlation methods, while E is restricted to blindly detecting the preamble with the legacy cross-correlation scheme only.
Figure 11.
Complexity comparison for preamble detection and payload demodulation between: (a) mod cross-corr and legacy cross-corr. (b) mod cross-corr and LoRa legacy scheme, legacy cross-corr and LoRa legacy scheme.
Figure 11.
Complexity comparison for preamble detection and payload demodulation between: (a) mod cross-corr and legacy cross-corr. (b) mod cross-corr and LoRa legacy scheme, legacy cross-corr and LoRa legacy scheme.
Figure 12.
Blind estimation performance by E as a function of , , no AWGN and AWGN cases with for the latter and . Legitimate receiver (B) performance is also considered for and .
Figure 12.
Blind estimation performance by E as a function of , , no AWGN and AWGN cases with for the latter and . Legitimate receiver (B) performance is also considered for and .
Figure 13.
SER performance of A or B for , several self-jamming peaks number and with the synchronization front-end activated. The perfect synchronization case is also considered as an optimal performance bound.
Figure 13.
SER performance of A or B for , several self-jamming peaks number and with the synchronization front-end activated. The perfect synchronization case is also considered as an optimal performance bound.
Figure 14.
Eve blind payload demodulation performance as a function of for several SNR values and . (a): Average estimated virtual paths number. (b): Probability of miss-detection.
Figure 14.
Eve blind payload demodulation performance as a function of for several SNR values and . (a): Average estimated virtual paths number. (b): Probability of miss-detection.
Table 1.
List of principal notations used in the paper.
Table 1.
List of principal notations used in the paper.
Notation and Symbols Meaning |
---|
global LoRa parameters |
SF | LoRa spreading factor |
M | number of possible chirp waveforms per symbol: |
T | symbol period |
| sampling frequency |
| sampling period |
B | LoRa bandwidth |
| carrier frequency |
indexes |
k | time index |
n | frequency index |
i | symbol index |
u | virtual path index |
m | cross-correlation index |
entities |
A | Alice |
B | Bob |
E | Eve |
legacy LoRa frame parameters |
| number of upchirp pilot symbols |
| number of downchirp pilot symbols |
| number of pilot symbols: |
| number of payload symbols |
| total number of symbols: |
a | current transmitted symbol |
| transmitted a-symbol waveform |
modified LoRa frame parameters |
U | number of virtual channel paths |
| upchirp pilot symbol value |
| downchirp pilot symbol value |
| d-th payload symbol |
| vector of virtual channel delays of upchirp pilot symbols |
| vector of virtual channel delays of downchirp pilot symbols |
| minimum DFT gap between virtual channel paths |
| total transmit power available |
| power of each virtual channel path: |
| modified upchirp preamble waveform |
| modified downchirp preamble waveform |
| modified data waveform |
synchronization parameters |
| STO delay |
| baseband carrier residual |
, | integer and fractional STO part |
, | integer and fractional CFO part |
L | number of preamble upchirps to detect for preamble detection |
| reference DFT upchirp for synchronization |
| reference DFT downchirp for synchronization |
| threshold for case detection |
R | oversampling factor for mitigation |
various notations |
| averaged x: |
Table 2.
LoRa self-jamming scheme parameters supposed to be known, unknown, kept secret from E, estimated with self-jamming scheme knowledge and blindly estimated by the legitimate or eavesdropper receivers.
Table 2.
LoRa self-jamming scheme parameters supposed to be known, unknown, kept secret from E, estimated with self-jamming scheme knowledge and blindly estimated by the legitimate or eavesdropper receivers.
Self-Jamming Scheme Parameter | A or B | E |
---|
LoRa parameters |
SF | ★ | ★ |
, B | ★ | ★ |
preamble waveform parameters |
, , | ★ | ★ |
, | ★ | ○ |
, | ★ | ○ |
payload waveform parameters |
, | ★ | ○ |
| ☐ | ○ |
global self-jamming parameters |
U | ★ |
△
|
| ★ | ○ |
synchronization parameters |
L | ★ | ★ |
| ★ | ○ |
| ☐ | + |
| △ | △ |
SFO | ☐ | + |
, | ☐ | △ |
Table 3.
Symbols meaning of symbols used in
Table 2.
Table 3.
Symbols meaning of symbols used in
Table 2.
Symbol | Symbol Meaning |
---|
★ | known |
+ | unknown |
○ | kept secret from E |
☐ | unknown and estimated with self-jamming scheme knowledge |
△
| unknown and blindly estimated |
Table 4.
Advantages and drawbacks of mod cross-corr.
Table 4.
Advantages and drawbacks of mod cross-corr.
Advantages |
---|
Mitigates U sensitivity |
Improves frame detection performance |
Improves payload demodulation performance |
Drawbacks |
Increases the complexity with U |
Table 5.
Advantages and drawbacks of legacy cross-corr.
Table 5.
Advantages and drawbacks of legacy cross-corr.
Advantages |
---|
Adds low-complexity burden |
Does not increase the complexity with U |
Drawbacks |
Leads to high sensitivity with U |
Reduces frame-detection performance |
Reduces synchronization performance |
Table 6.
Advantages and drawbacks of the LoRa self-jamming scheme.
Table 6.
Advantages and drawbacks of the LoRa self-jamming scheme.
Advantages |
---|
Enables more discrete LoRa communications |
Hides sensitive information from eavesdroppers |
Makes design parameter collection difficult for eavesdroppers |
Drawbacks |
Higher implementation complexity |
Reasonably small SER performance loss |
Software modifications required on existing LoRa transceivers |
| Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).