Open Access iconOpen Access

ARTICLE

crossmark

Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment

Kun-Lin Tsai1,2,*, Li-Woei Chen3, Fang-Yie Leu4,5, Chuan-Tian Wu1

1 Department of Electrical Engineering, Tunghai University, Taichung, 407, Taiwan
2 Research Center for Smart Sustainable Circular Economy, Tunghai University, Taichung, 407, Taiwan
3 Department of Computer and Information Sciences, Chinese Military Academy, Kaohsiung, 830, Taiwan
4 Department of Computer Science, Tunghai University, Taichung, 407, Taiwan
5 Emergency Response Management Center, Industry-Academia Collaboration and University Extension Division, Ming-Chuan University, Taipei, 111, Taiwan

* Corresponding Author: Kun-Lin Tsai. Email: email

Computers, Materials & Continua 2022, 73(1), 547-562. https://doi.org/10.32604/cmc.2022.026557

Abstract

Secure data communication is an essential requirement for an Internet of Things (IoT) system. Especially in Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) systems, when important data are hacked, it may induce property loss or life hazard. Even though many IoT-related communication protocols are equipped with secure policies, they still have some security weaknesses in their IoT systems. LoRaWAN is one of the low power wide-area network protocols, and it adopts Advanced Encryption Standard (AES) to provide message integrity and confidentiality. However, LoRaWAN's encryption key update scheme can be further improved. In this paper, a Two-stage High-efficiency LoRaWAN encryption key Update Scheme (THUS for short) is proposed to update LoRaWAN's root keys and session keys in a secure and efficient way. The THUS consists of two stages, i.e., the Root Key Update (RKU) stage and the Session Key Update (SKU) stage, and with different update frequencies, the RKU and SKU provide higher security level than the normal LoRaWAN specification does. A modified AES encryption/decryption process is also utilized in the THUS for enhancing the security of the THUS. The security analyses demonstrate that the THUS not only protects important parameter during key update stages, but also satisfies confidentiality, integrity, and mutual authentication. Moreover, The THUS can further resist replay and eavesdropping attacks.

Keywords


Cite This Article

K. Tsai, L. Chen, F. Leu and C. Wu, "Two-stage high-efficiency encryption key update scheme for lorawan based iot environment," Computers, Materials & Continua, vol. 73, no.1, pp. 547–562, 2022. https://doi.org/10.32604/cmc.2022.026557



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1196

    View

  • 601

    Download

  • 0

    Like

Share Link