2020
DOI: 10.1109/access.2020.2978100
|View full text |Cite
|
Sign up to set email alerts
|

Secure Session Key Generation Method for LoRaWAN Servers

Abstract: In recent years, Internet of Things (IoT) as an essential infrastructure for industrial development, environmental protection and human life enhancement has attracted researchers' attention. Currently, there are four hot research topics in IoT fields, including sensor design, communication scheme, secure transmission, and data mining. The LoRaWAN, an unlicensed band based long range wide area network specification, is very suitable for the activities or operations in an IoT environment due to its low power and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(20 citation statements)
references
References 15 publications
0
20
0
Order By: Relevance
“…It can not only store large-scale hospital financial data through the cloud, but also process hospital financial data according to the parallel characteristics of the cluster and the computing performance of each node. Among a large number of hospital information data, hospital financial data is most vulnerable to attack and theft in storage and retrieval [2,3]. erefore, the privacy protection of hospital financial data is not only an urgent problem to be solved in the operation of large hospital financial data, but also a very important topic in the field of information security, which has attracted extensive attention of relevant researchers.…”
Section: Introductionmentioning
confidence: 99%
“…It can not only store large-scale hospital financial data through the cloud, but also process hospital financial data according to the parallel characteristics of the cluster and the computing performance of each node. Among a large number of hospital information data, hospital financial data is most vulnerable to attack and theft in storage and retrieval [2,3]. erefore, the privacy protection of hospital financial data is not only an urgent problem to be solved in the operation of large hospital financial data, but also a very important topic in the field of information security, which has attracted extensive attention of relevant researchers.…”
Section: Introductionmentioning
confidence: 99%
“…A formal security analysis can be used to confirm that the proposed communication protocols support the root key updating scheme. The communication protocol pairs, 𝑁𝑒𝑤_𝐽𝑜𝑖𝑛-𝑟𝑒𝑞𝑢𝑒𝑠𝑡 and 𝑁𝑒𝑤_𝐽𝑜𝑖𝑛-𝑎𝑐𝑐𝑒𝑝𝑡 and 𝑁𝑒𝑤_𝑅𝑒𝑗𝑜𝑖𝑛-𝑟𝑒𝑞𝑢𝑒𝑠𝑡 and 𝑁𝑒𝑤_𝑅𝑒𝑗𝑜𝑖𝑛-𝑎𝑐𝑐𝑒𝑝𝑡, are validated using Scyther tools [63][64][65]. Scyther is a validation tool that can be used to test the security of protocols and communication networks under enemy control [66] [67].…”
Section: B Communication Protocol Testmentioning
confidence: 99%
“…A session key generation method for LoRaWAN servers, named "Server Session Key Generation" (S2KG), is presented in Reference [18]. In the S2KG method, symmetric and asymmetric encryption are combined to generate session keys for communication between servers in a LoRaWAN network.…”
Section: Related Workmentioning
confidence: 99%