2018
DOI: 10.1109/access.2018.2852563
|View full text |Cite
|
Sign up to set email alerts
|

AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 114 publications
(57 citation statements)
references
References 34 publications
0
55
0
2
Order By: Relevance
“…As a future work, a similar analysis can conducted for other cryptanalysis techniques, such as differential cryptanalysis [13]. Another interesting future direction is to study the application of the proposed algorithms to some wireless protocols [14], [15].…”
Section: Discussionmentioning
confidence: 88%
“…As a future work, a similar analysis can conducted for other cryptanalysis techniques, such as differential cryptanalysis [13]. Another interesting future direction is to study the application of the proposed algorithms to some wireless protocols [14], [15].…”
Section: Discussionmentioning
confidence: 88%
“…In a detailed mitigation solution to the menace, the authors proposed the deployment of sniffed join request messages approach. In another security assessment study, the authors in [ 22 ] proposed an AES-128 based Secure Low Power Communication (SeLPC) method for enhancing the security level of LoRaWAN communication by periodically updating encryption key (AppSKey) and lookup table (D-Box) on both end-devices and application-server sides. In a similar LoRaWAN v1.0 replay attack study, the authors in [ 72 ] initially analyze the typical approach that attackers used to implement the replay attack specifically as “replay of join accept message” and “harvest of join message”.…”
Section: Lpwan Security Analysismentioning
confidence: 99%
“…The threats, effects and impacts of LPWAN security menaces have been extensively discussed in numerous studies [ 15 , 16 , 17 , 18 ]. To mitigate the growing IoT and LPWAN security challenges, numerous security solutions such as intrusion detection systems (IDSs), key management and encryption schemes have been proposed in the literature [ 19 , 20 , 21 , 22 ]. Despite the satisfactory performances demonstrated, some of the various schemes and upgrades from the standard producers have struggled in addressing the emerging security requirements of the IoT operational environment, e.g., despite LoRaWAN’s specification that laid emphasis on key management protocol whereby a compromised key from an end node should not create a major problem for other nodes, experiences have shown that key management issues is still a major problem with regards to the standard.…”
Section: Introductionmentioning
confidence: 99%
“…In Tsai et al [36] the authors propose an AES-128 encryption scheme for LoRaWAN networks that they assert to be more energy efficient than the current AES-128 implementation that is built into the protocol. This study examines the energy usage over a period of one day in a comparative manner.…”
Section: Previous Workmentioning
confidence: 99%