A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis
Abstract
:1. Introduction
- We provided a comprehensive analysis of the existing LoRaWAN’s security key models to analyze their strengths and weaknesses.
- We designed and implemented two Trusted Key Management Server (TKMS) Algorithms A and B, where B is an enhanced A.
- We applied the formal analysis methods to prove logic correctness and to verify the proposed models against all possible LoRaWAN attacks by improving the security level of the trusted key server. The model proposed in [7] though achieved confidentiality, integrity, authentication, and security against replay and DoS attacks; however, based on the results of the security claims verification in terms of secrecy, alive, weakagree, nisynch, niagree, it was discovered that the entities were only secured within the bounds. The network should be secured within bounds for any possible internal attacks, and outside bounds for possible external attacks, and if the model is only secured within bounds, external attacks are likely to exploit the network as no security is put in place for eliminating them.
- Trusted key server and AppKey independency: A trusted key server is implemented to reduce the possibilities of DoS and server attacks. As discussed in the analysis of existing security models, the AppKey is pre-distributed between the end-device(s) and the network server or the trusted third party; however, this could lead to a replay attack, denial of service (DoS) attack, or server attack if the AppKey is exploited before initiating the communication. In this paper, the implemented trusted the third party generates the AppSKey and the NwkSKey after receiving the AppKey from the entity that transmitted the request to join messages; this ensures a unique AppKey is activated for every request to join a session. Moreover, for every request to join sessions, AppKey generates the NwkSKey and AppSKey using uniquely generated prime numbers.
- Replay attack countermeasure: A timestamp is generated for every transmitting entity in the request to join sessions and stored in the receiving entities for validation during accepting to join sessions. This ensures that every transmitted message is freshly generated. If the received timestamp is not the same as the previous timestamp of the very same transmitting entity, then there is a possibility of a replay attack.
- Authentication and message integrity: The existing models employ symmetric encryption, asymmetric encryption or even both for authentication and validation of message integrity; however, these algorithms are heavy on operations. In this paper, we implemented hashing algorithm for performing authentication and validating message integrity as they have low processing and computation times.
- Logic correctness: The design of LoRaWAN security models is different based on different researchers’ objectives. However, the LoRaWAN security models are common in validating and proving the authenticity of the entities. With most of the existing works in LoRaWAN security using security verifying tools only for security claims analysis, authenticity is discussed without proof based on the security claims. In this paper, the Scyther tool is used for security claim analysis, and BAN logic formal analysis is used to prove the logical correctness of our proposed model including the validation of entity authenticity. This is to guarantee the receiving entity that the received message is from the trusted and authenticated entity.
- Prime numbers: Prime numbers as they are easy to compute but difficult to break, maximize the security level of the entities in two operations and they are uniquely generated for each operation. First, they are used for entity authentication instead of nonces as these nonces are unsecured pseudo-random numbers, second, they are used for generating NwkSKey and AppSKey; this counter various key attacks as the prime number are resource constraining to be guessed before exploiting all the parameters used to generate the key.
2. Symmetric Encryption and Hashing
2.1. Symmetric Encryption
- Data Encryption Standard (DES): The DES algorithm’s original standard uses a 56 bit key with the combination of 0s and 1s. Some years back, it was difficult to break DES due to the computers that were used; however, in modern society, powerful computers have been developed which can take a lesser time for breaking the DES algorithm. Based on this, DES has been discontinued in most implementations [14,15,16,17,18].
- Triple Data Encryption Standard (3DES): The 3DES is an advanced and improved version of the DES algorithm, where it applies the DES operations and functions three times. The strength of 3DES lies in a longer key than DES by generating a 56 bit key three times. The key is to be fully specified for all three encryption iterations. However, there is an option of using the key same for all three iterations which will be a 56 bit key or the same key for two iterations and the iteration with a different key which will be a 112 bit key, or all three iterations use different keys summing up to a 168 bit key is used [14,15,16,17,18].
- International Data Encryption Algorithm (IDEA): The IDEA is a 128 bit key algorithm that was developed aiming to replace the DES algorithm. The shortfall in implementing IDE was based on two reasons, it is prone to produce a range of weak symmetric keys, and many symmetric algorithms are faster than IDE but have the same security level as IDEA [14,15,16,17,18].
2.2. Hashing Function
3. Related Works
4. Methodology
- (1)
- (2)
- (3)
- (4)
- (5)
- Alive and weakagree: For this claim, all the entities are implemented with the same scheme; alive claims ensure that all the transmitted messages between the entities are encrypted with the same scheme, and weakagree ensure that all the participating entities are running on the scheme [22,23,24,25].
- (6)
- (7)
- Commit, running claim: This claim is another form of niagree, where a niagree for defining a specific role within a set of data by adding relevant signal claims. The Commit claim is invoked to identify the effective claim of the protocol, and the Running claim ensures that the effective claim invoked by Commit attains correctness of the existing Running signal within the found trace [22,23,24,25].
- (8)
- Non-injective synchronization (nisynch) claim: All the transmission processes and sessions to take in the network between the entities are to adhere to all the security specifications of the proposed protocol and all the participating entities shall adhere to being synchronized in their current state [22,23,24,25].
5. Proposed LoRaWAN Security Model
5.1. Overview
- End-device: A LoRaWAN device that is being deployed in the network after manufacturing. This end device is pre-programmed with several parameters such as the AppKey, the device universal identifier used to identify itself in the network, and the AppKey that will be shared with the trusted key server during the request to join process.
- Trusted key server: The trusted key server is employed as a trusted party to generate and manage the keys securely and efficiently in the network. It is used in our model to ease some of the complex operations that were performed by the network server alone such as key generation and update. This server upon receiving AppKey for the end device, generates two session keys, the AppSKey used for securing the communication between the end device and the application server, and the NwkSKey used for securing between the end device and the network server.
- Network server: This is responsible for generating and distributing network parameters with the end device so that during transmission the end device is knowledgeable of the network to transmit on, and the unoccupied channels that can be used for the transmission.
5.2. TKMS Algorithm Design
- (a)
- In verifying the protocol there were no end-device attacks detected on the TKMS Algorithm A, and as for the network server and the key server, there were no attacks within the bounds. However, to fully secure the network, security should be enforced against external attacks outside bounds and for internal attacks within bounds.
- (b)
- In verifying all security automatic claims for each entity, we realized that though the model has a certain level of security, the end device remains secure against all possible attacks in LoRaWAN, but the network server and the key server are still secure against attacks within bounds only.
- NwkSKey = , are composed of the transmission parameters for a specific transmission;
- AppSKey = , are composed of the transmission parameters for a specific transmission;
- Prime numbers ≈ , ∴ a is prime IFF ∃ a: a < n, then a prime if ;
- CFList = {} represent free channels;
- H (●) = H(h) ≈ a = H(b), cannot predict b from a hashed value a such that a = H (), choosing a value or data of on a scale of 1 to bits to produce a hashed value a, it is difficult to predict the data of ;
- NwkID = {} represent the identity of the network;
- Timestamp ( = ∈ {> θ T} is accepted as a valid timestamp otherwise a replay attack is detected;
- Message (M) encryption = , where are the entities EUI’s, are the prime numbers of the entities, is the timestamp of the entity and are the transmission parameters.
5.2.1. TKMS Algorithm A
Algorithm 1: TKMS Algorithm A |
Input = //Request To Join Message: Encrypted and Hashed message |
Output=//Accept To Join Message: Hashed message Steps: |
WHILE (Request to Join Initiated) { |
IF []) { |
THEN |
1st: EDs ⇒ KeySvr { [] } |
2nd: KeySvr ⇒ NwkS { [] } |
3rd: NwkS ⇒ EDs {[ } } |
IF ((s) { |
4th and 5th: EDs ⇔ KeySvr { } |
6th and 7th: EDs ⇔ NwkS { } |
8th: EDs ⇒ KeySvr { } |
9th and 10th: KeySvr ⇔ NwkS { } |
11th: KeySvr ⇒ EDs |
{ } } |
IF [( is approved by receiving entity until the 11th step) { |
//Authentication & MIC approved |
Request To Join |
Approved } |
ELSE { |
“Terminate Request To Join = “Unauthorized user found and Message Falsified” } |
} |
- Step 1: The EDs initiate the system by sending the request to join message (EDsPrN || EDs || NwkS || EDsT || AppKey) to the KeySvr. The message is composed of the uniquely and freshly generated parameters of; EDsPrN, EDs, EDsT and the AppKey; these parameters are encrypted with the encryption session key (k(EDs, KeySvr) of the EDs and the KeySvr. Moreover, the same unique parameters are signed with a H function as [(H(EDsPrN || EDs || NwkS || EDsT || AppKey)].
- Step 2: Upon receiving the request to join the message from the EDs, the KeySvr performs decryption on the message using k(EDs, KeySvr), authentication and re-calculating message integrity as [(H(EDsPrN || EDs || NwkS || EDsT || AppKey)]. If valid, the KeySvr stores the received parameters of EDsPrN, EDs, EDsT and the AppKey, then forwards the request to join message to the NwkS (EDsPrN || KeySvrPrN || EDs || KeySvr || KeySvrT) encrypted with k(KeySvr, NwkS) by generating a unique KeySvrPrN, and KeySvrT, and also hash the message as H (EDs || NwkPrN || DevAddr || RxDelay || CFList || NwkID || NwkST)].
- Step 3: If the NwkS successfully receives the message, the NwkS performs decryption on the received encrypted message using k(KeySvr, NwkS), authentication and re-calculates the message integrity as [H(KeySvrPrN || EDs || KeySvr || KeySvrT)]. If valid, the NwkS stores all the received parameters in the message, then directly send the accept to join message to the EDs as [(EDsPrN || NwkPrN || DevAddr || RxDelay || CFList || NwkID || NwkS || NwkST || KeySvr || KeySvrT)] encrypted with (NwkS, EDs) with uniquely generated DevAddr, CFList, RxDelay, NwkID, and NwkPrN, and also hash the message as [H(EDs || NwkPrN || DevAddr || RxDelay || CFList || NwkID || NwkST)]; Accept to join message is directly transmitted to the EDs using a unique NwkID that will ensure that requesting and accepting channels are isolated in the network. This is to avoid any channel attacks. DevAddr is assigned to the specific EDs that initiated the request.
- Step 4: If the EDs successfully receives the message, the EDs performs decryption on the received encrypted message using k(NwkS, EDs), authentication and re-calculates message integrity as [H(EDs || NwkPrN || DevAddr || RxDelay || CFList || NwkID || NwkST)]. If valid, the EDs store the uniquely generated parameters in the message, and send a hashed message [H(DevAddr || NwkS || NwkID || KeySvrT || EDsPrN)] to the KeySvr. DevAddr uniquely identifies the specific end device to receive the AppSKey, NwkSKey, and other important parameters such as unique NwkID for transmission, and the prime numbers used to generate and hash the AppSKey and NwkSKey.
- Step 5: The KeySvr will only perform authentication and re-calculates message integrity as [H(DevAddr || NwkS || NwkID || KeySvrT || EDsPrN)] if the hashed message is successfully received. If successfully received from the EDs, the KeySvr stores the DevAddr and NwkID, then send a hash message to the EDs as [H(DevAddr || KeySvrT || NwkSKey || KeySvrPrN1 || NwkID) || H (DevAddr || KeySvrT || AppSKey || KeySvrPrN2 || NwkID)]. The AppSKey and NwkSKey are uniquely generated from AppKey with unique KeySvrPrN1 and KeySvrPrN2 and will be used by the EDs should they wish to communicate with other EDs.
- Step 6: Upon a successful reception, the EDs will then authenticate and re-calculate the message integrity with [H(DevAddr || KeySvrT || NwkSKey || KeySvrPrN1 || NwkID) || H (DevAddr || KeySvrT || AppSKey || KeySvrPrN2 || NwkID)] and stores KeySvrPrN1, KeySvrPrN2, NwkSKey, and AppSKey, then send the hashed request to acknowledge message to the NwkS as [H(KeySvr || EDsPrN || NwkPrN)] to notify the NwkS that the session keys and prime numbers are successfully received from the KeySvr and request the NwkID to be verified before starting any communication with other end devices. The EDsPrN and NwkPrN are used by EDs for authentication, and the KeySvrPrN1 and KeySvrPrN2 are used by the EDs to generate its AppSKey and NwkSKey from the AppKey and check if they are the same as the ones received from the KeySvr, if different, the ED terminates the request.
- Step 7: If the NwkS successfully receives the hashed acknowledgement request from the EDs, the message integrity is re-calculated as [H(KeySvr || EDsPrN || NwkPrN)] and if successful, an acceptance to acknowledge hashed message is generated and transmitted as [H(DevAddr || NwkST || NwkID)], with the NwkId to identify the network to use for future communication within the same request to join.
- Step 8: If the hashed message is received by the ED, the ED will authenticate and re-calculate the message integrity as [H(DevAddr || NwkST || NwkID)], if successful, then the ED will generate and forward an accept to acknowledge hashed message as [H(NwkS || NwkID || KeySvrT)] to the KeySvr to notify the KeySvr that request has been acknowledged, the NwkID is verified and the NwkSKey can be transmitted to the NwkS.
- Step 9: The KeySvr receives the hashed message, authenticates and re-calculates the message integrity as [H(NwkS || NwkID || KeySvrT)] and if successful, then generates a unique NwkSKey, and transmits a hashed message to the NwkS with the NwkSKey as [H(KeySvrT || NwkSKey)].
- Step 10: The NwkS receives the hashed message in Step 9, authenticates and re-calculates the message integrity from the received hashed message as [H(KeySvrT || NwkSKey)], if successful, NwkSKey is stored and a hash message of [H(KeySvrT || KeySvrPrN)] is generated for notifying the KeySvr that the NwkSKey is successfully received.
- Step 11: The KeySvr receives the hashed message in Step 10, authenticates and re-calculates the message integrity from the received hashed message as [H(KeySvrT || NwkSKey)], if successful, the KeySvr generate a hashed message of [H(KeySvrT || NwkID || EDsT)] for notifying the EDs that the join procedure is successful.
Algorithm 2: Enhanced-TKMS Algorithm
5.2.2. TKMS Algorithm B
5.2.3. BAN Logic
- A.
- General initial assumptions
- : P believes P and Q share the same main key
- : P believes P and Q share the same encryption key
- : P believes P and Q share the same session key
- : P believes M
- : P once said M
- P : P sees (receives) message M
- : P has jurisdiction over M
- : The formula (M) is fresh
- : The formula is encrypted under encryption key K
- : The formula is hashed under the hash function H
- B.
- Rules
- 1.
- Message semantics Rule (Rule 1): If P believes that P and Q communicate on the shared main key (), then P sees the message is encrypted under key K or hash function H or both of them and needs to perform decryption on it, then P believes that Q once said . By this rule, we ensure that P did not send itself the message under the initial assumption that the message is generated by Q and A and P are not equal.
- 2.
- Verification Rule (Rule 2): By Rule 2, if P believes that Q said , then P has once believed that Q has once said . By this rule, applying the belief and freshness assertion of saying P believes that the message is freshly generated, then P is expected to believe that Q believes . Note that can either be encrypted, hashed or both to ensure P of the integrity of .
- 3.
- Jurisdiction Rule (Rule 3): By Rule 3, if P believes that Q has jurisdiction over , where it is true or not, then if P trusts Q on the truth of ), then P must believe .
- 4.
- Decomposition Rule (Rule 4)
- (1)
- By Rule 1:
- (2)
- By Rule 2:
- (3)
- By Rule 3:
- (4)
- Applying Rule 4 (c):
- (5)
- Re-applying Rule 1:
- (6)
- By Rule 2:
- (7)
- By Rule 3:
- (8)
- Re-applying Rule 4 (c):
- (9)
- Re-applying Rule 1:
- (10)
- Re-applying Rule 2:
- (11)
- Re-applying Rule 3:
- (12)
- Re-applying Rule 4 (c):
- (13)
- By re-applying Rule 1:
- (14)
- By re-applying Rule 2:
- (15)
- Finally, the following are derived: and to prove that EDs and NwkS can authenticate one another through a trusted third party (KeySvr). In line with the Scyther to prove the security efficiency of our proposed algorithms, BAN logic is applied as the foundation of proving the logical correctness of our proposed algorithm. The discussion results generated by Scyther are discussed as follows.
6. Security Evaluation
6.1. Secrecy Claim
6.2. Alive and Weakagree Claim
6.3. Niagree
6.4. Nisynch
7. Discussions
7.1. Comparison of Proposed Algorithms Security Claims with Similar Algorithms
7.2. Comparison of Proposed Algorithms with Similar Algorithms
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Choi, J.; Kim, Y. An Improved LEA Block Encryption Algorithm to Prevent Side-Channel Attack in the IoT System. In Proceedings of the 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, Korea, 13–16 December 2016; pp. 1–4. [Google Scholar]
- Han, J.; Wang, J. An enhanced key management scheme for LoRaWAN. Cryptography 2018, 2, 34. [Google Scholar] [CrossRef]
- Hu, Z. Layered Network Protocols for Secure Communications in the Internet of Things; University of Oregon: Eugene, OR, USA, 2021. [Google Scholar]
- Kim, J.; Song, J. A dual key-based activation scheme for secure LoRaWAN. Wirel. Commun. Mob. Comput. 2017, 2017, 6590713. [Google Scholar] [CrossRef]
- Mahmood, Z.; Ning, H.; Ghafoor, A. A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors 2017, 17, 670. [Google Scholar] [CrossRef] [PubMed]
- Na, S.; Hwang, D.; Shin, W.; Kim, K.-H. Scenario and Countermeasure for Replay Attack Using Join Request Messages in LoRaWAN. In Proceedings of the 2017 International Conference on Information Networking (ICOIN), Da Nang, Vietnam, 11–13 January 2017; pp. 718–720. [Google Scholar]
- Naoui, S.; Elhdhili, M.E.; Saidane, L.A. Trusted Third Party Based Key Management for Enhancing LoRaWAN security. In Proceedings of the 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia, 30 October–3 November 2017; pp. 1306–1313. [Google Scholar]
- Roselin, A.G.; Nanda, P.; Nepal, S. Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks. In Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, 1–4 August 2017; pp. 371–378. [Google Scholar]
- Ruotsalainen, H.; Zhang, J.; Grebeniuk, S. Experimental Investigation on Wireless Key Generation for Low-Power Wide-Area Networks. IEEE Internet Things J. 2019, 7, 1745–1755. [Google Scholar] [CrossRef]
- Tsai, K.-L.; Huang, Y.-L.; Leu, F.-Y.; You, I. TTP based high-efficient multi-key exchange protocol. IEEE Access 2016, 4, 6261–6271. [Google Scholar] [CrossRef]
- Tsai, K.-L.; Huang, Y.-L.; Leu, F.-Y.; You, I.; Huang, Y.-L.; Tsai, C.-H. AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access 2018, 6, 45325–45334. [Google Scholar] [CrossRef]
- Yang, X.; Karampatzakis, E.; Doerr, C.; Kuipers, F. Security vulnerabilities in LoRaWAN. In Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), Orlando, FL, USA, 17–20 April 2018; pp. 129–140. [Google Scholar]
- Qadir, A.M.; Varol, N. A Review Paper on Cryptography. In Proceedings of the 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Barcelos, Portugal, 10–12 June 2019; pp. 1–6. [Google Scholar]
- Hamza, A.; Kumar, B. A Review Paper on DES, AES, RSA Encryption Standards. In Proceedings of the 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India, 4–5 December 2020; pp. 333–338. [Google Scholar]
- Dhanda, S.S.; Singh, B.; Jindal, P. Lightweight cryptography: A solution to secure IoT. Wirel. Pers. Commun. 2020, 112, 1947–1980. [Google Scholar] [CrossRef]
- Zhang, Q. An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption. In Proceedings of the 2021 2nd International Conference on Computing and Data Science (CDS), Stanford, CA, USA, 12–17 August 2021; pp. 616–622. [Google Scholar]
- Lozupone, V. Analyze encryption and public key infrastructure (PKI). Int. J. Inf. Manag. 2018, 38, 42–44. [Google Scholar] [CrossRef]
- Long, S. A Comparative Analysis of the Application of Hashing Encryption Algorithms for MD5, SHA-1, and SHA-512. J. Phys. Conf. Ser. 2019, 1314, 012210. [Google Scholar] [CrossRef]
- Zhu, S.; Zhu, C.; Wang, W. A new image encryption algorithm based on chaos and secure hash SHA-256. Entropy 2018, 20, 716. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Zefreh, E.Z. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimed. Tools Appl. 2020, 79, 24993–25022. [Google Scholar] [CrossRef]
- Semal, B.; Markantonakis, K.; Akram, R.N. A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks. In Proceedings of the 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), London, UK, 23–27 September 2018; pp. 1–8. [Google Scholar]
- Cremers, C. “Scyther” Semantics and Verification of Security Protocols. Ph.D. Thesis, University Press Eindhoven, Eindhoven, The Netherlands, 2006. [Google Scholar]
- Budiyanto, S.; Santosa, G.B.; Mariati, F.R.I. Upgrading the S-NCI Key Establishment Protocol Scheme to be Secure and Applicable. IOP Conf. Ser. Mater. Sci. Eng. 2018, 453, 012002. [Google Scholar] [CrossRef]
- Dalal, N.; Shah, J.; Hisaria, K.; Jinwala, D. A comparative analysis of tools for verification of security protocols. Int. J. Commun. Netw. Syst. Sci. 2010, 3, 779. [Google Scholar] [CrossRef] [Green Version]
- Naoui, S.; Elhdhili, M.E.; Saidane, L.A. Enhancing the Security of the IoT LoraWAN Architecture. In Proceedings of the 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), Toulouse, France, 26–28 September 2016; pp. 1–7. [Google Scholar]
- Lee, J.; Hwang, D.; Park, J.; Kim, K.-H. Risk Analysis and Countermeasure for Bit-Flipping Attack in LoRaWAN. In Proceedings of the 2017 International conference on information networking (ICOIN), Da Nang, Vietnam, 11–13 January 2017; pp. 549–551. [Google Scholar]
Notations | Definitions |
---|---|
KeySvr | Key Server (or TKMS) Universal Identity |
EDs | End Device Universal Identity |
NwkS | Network Server Universal Identity |
k(EDs, KeySvr) | Encryption session key between EDs and KeySvr |
k(KeySvr, NwkS) | Encryption session key between KeySvr and NwkS |
k(NwkS, EDs) | Encryption session key between NwkS and EDs |
H | Hash function |
ε | Encryption between the entities (EDs, KeySvr, and NwkS) |
AppKey | Application Key |
AppSKey | Application Session Key |
NwkSKey | Network Session Key |
EDsT | End Device Timestamp |
KeySvrT | Key Server Timestamp |
NwkST | Network Server Timestamp |
EDsPrN | End Device Prime Number |
NwkPrN | Network Server Prime Number |
KeySvrPrN | Key Server Prime Number between NwkS and KeySvr |
KeySvrPrN1 | Key Server Prime Number between EDs and KeySvr for generating NwkSKey |
KeySvrPrN2 | Key Server Prime Number between EDs and KeySvr for generating AppSKey |
CFList | Channel List |
RxDelay | Transmission Delay |
NwkID | Network Identity |
DevAddr | Device Address |
Algorithm | Entity | Claims | |||||
---|---|---|---|---|---|---|---|
EDs | Transmission Parameters Secrecy | Alive | Weakagree | Nisynch | Niagree | Security Status | |
A | No attacks | No attacks | No attacks | No attacks | No attacks | No attacks | Verified |
B (improved) | No attacks | No attacks | No attacks | No attacks | No attacks | No attacks | Verified |
Entities | Claims | |||||
---|---|---|---|---|---|---|
Transmission Parameters Secrecy | Alive | Weakagree | Nisynch | Niagree | Security Status | |
KeySvr | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified |
NwkS | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified |
Entities | Transmission Parameters Secrecy | Alive | Weakagree | Nisynch | Niagree | Overall Security Status |
---|---|---|---|---|---|---|
KeySvr | No attacks | No attacks | No attacks | No attacks | No attacks | Verified |
NwkS | No attacks | No attacks | No attacks | No attacks | No attacks | Verified |
Entities | Algorithms | Transmission Parameters Secrecy | Alive | Weakagree | Nisynch | Niagree | Overall Security Status |
---|---|---|---|---|---|---|---|
Eds | A | No attacks | No attacks | No attacks | No attacks | No attacks | Verified |
B | No attacks | No attacks | No attacks | No attacks | No attacks | Verified | |
[7] | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified | |
KeySvr | A | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified |
B | No attacks | No attacks | No attacks | No attacks | No attacks | Verified | |
[7] | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified | |
NwkS | A | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified |
B | No attacks | No attacks | No attacks | No attacks | No attacks | Verified | |
[7] | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified |
Entities | Algorithms | Transmission Parameters Secrecy | Alive | Weakagree | Nisynch | Niagree | Overall Security Status |
---|---|---|---|---|---|---|---|
EDs | A | No attacks | No attacks | No attacks | No attacks | No attacks | Verified |
B | No attacks | No attacks | No attacks | No attacks | No attacks | Verified | |
[7] | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified | |
KeySvr | A | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified |
B | No attacks | No attacks | No attacks | No attacks | No attacks | Verified | |
[7] | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified | |
NwkS | A | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | No attacks within bounds | Verified |
B | No attacks | No attacks | No attacks | No attacks | No attacks | Verified | |
[7] | No attacks | No attacks | No attacks | No attacks | No attacks | Verified |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ntshabele, K.; Isong, B.; Gasela, N.; Abu-Mahfouz, A.M. A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis. J. Sens. Actuator Netw. 2022, 11, 52. https://doi.org/10.3390/jsan11030052
Ntshabele K, Isong B, Gasela N, Abu-Mahfouz AM. A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis. Journal of Sensor and Actuator Networks. 2022; 11(3):52. https://doi.org/10.3390/jsan11030052
Chicago/Turabian StyleNtshabele, Koketso, Bassey Isong, Naison Gasela, and Adnan M. Abu-Mahfouz. 2022. "A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis" Journal of Sensor and Actuator Networks 11, no. 3: 52. https://doi.org/10.3390/jsan11030052
APA StyleNtshabele, K., Isong, B., Gasela, N., & Abu-Mahfouz, A. M. (2022). A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis. Journal of Sensor and Actuator Networks, 11(3), 52. https://doi.org/10.3390/jsan11030052