Abstract
In the past few years, the development of Internet of Things (IoT) has demonstrated a great convenience for human beings’ lives. A well-defined IoT communication protocol assists data transmitted on IoT in a secure and efficient way. The LoRaWAN developed by the LoRa Alliance employs asynchronous communication and three communication modes to control its energy consumption, and utilizes the AES cryptology and two session keys to enhance its communication security. However, the AES encryption process consumes much energy, and the session key also lacks of simple update procedure. To reduce the energy consumed by AES and enhance communication security, in this paper, we design an energy-efficient AES encryption method, named Energy Efficient Data Encryption (E2DE for short) which adopts three low energy design techniques and a simple key update procedure. Simulation is performed by using Synopsys 32 nm cell library with 5 different supply voltages. Experimental results show that average 46.1% energy is reduced when compared to the traditional AES data encryption method. Besides, the session key update procedure can achieve mutual authentication and resist replay and eavesdropping attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tang, B., Chen, Z., Hefferman, G., Pei, S., Wei, T., He, H., Yang, Q.: Incorporating intelligence in fog computing for big data analysis in smart cities. IEEE Trans. Industr. Inf. 13(5), 2140–2150 (2017)
Ahmad, S., Badwelan, A., Ghaleb, A.M., Qamhan, A., Sharaf, M.: Analyzing critical failures in a production process: is industrial IoT the solution? In: Wireless Communications and Mobile Computing, vol. 2018, pp. 1–12, Dec 2018. Article ID 6951318
Yeh, K.H.: A secure IoT-based healthcare system with body sensor networks. IEEE Access 4, 10288–10299 (2016)
[Online]. Available: https://www.lora-alliance.org/
Prasithsangaree, P., Krishnamurthy, P.: Analysis of energy consumption of RC4 and AES algorithms in wireless LANs. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), pp. 1445–1449, Dec 2003
McGrew, D.: Low power wireless scenarios and techniques for saving bandwidth without sacrificing security. In: Proceedings of NIST Lightweight Cryptography Workshop, pp. 1–15, July 2015
Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based Internet of things. Wireless Pers. Commun. 61(3), 527–542 (2011)
Tsai, K.L., Huang, Y.L., Leu, F.Y., You, I., Huang, Y.L., Tsai, C.H.: AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access 6, 45325–45334 (2018)
LoRaWAN Backend Interfaces 1.0 Specification, LoRa Alliance Inc. (2017)
Butun, I., Pereira, N., Gidlund, M.: Security risk analysis of LoRaWAN and future directions. Future Internet 11(1), 1–22 (2019). Article 3
Miller, R.: LoRa security—building a secure LoRa solution. MWR Labs Whitepaper, Mar 2016
You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.: An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18(6), 1–32 (2018). Article 1888
Kim, J., Song, J.: A dual key-based activation scheme for secure LoRaWAN. In: Wireless Communications and Mobile Computing, vol. 2017, pp. 1–12, Nov 2017. Article 6590713
Oniga, B., Dadarlat, V., De Poorter, E., Munteanu, A.: Analysis, design and implementation of secure LoRaWAN sensor network. In: Proceedings of IEEE International Conference on Intelligent Computer Communication and Processing, pp. 421–428, Sept 2017
Dönmez, T.C.M., Nigussie, E.: Security of join procedure and its delegation in LoRaWAN v1.1. In: Proceedings of International Conference on Future Networks and Communications, pp. 204–211 (2018)
Naoui, S., Elhdhili, M.E., Saidane, L.A.: Trusted third party based key management for enhancing LoRaWAN security. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, pp. 1306–1313, Oct 2017
Cheng, Y., Saputra, H., Goh, L.M., Wu, Y.: Secure smart metering based on LoRa technology. In: Proceedings of IEEE International Conference on Identity, Security, and Behavior Analysis, pp. 1–8, Jan 2018
Tsai, K.L., Chang, Y.J., Cheng, Y.C.: Automatic charge balancing content addressable memory with self-control mechanism. IEEE Trans. Circuits Syst. I Regul. Pap. 61(10), 2834–2841 (2014)
Acknowledgements
The work was supported by the Ministry of Science and Technology, Taiwan, R.O.C. under Grant no. MOST 107-2221-E-029-006. The authors would also like to express thanks to Synopsys Inc. and Dr. Charles Chiang of Synopsys Inc. for donation of “Tunghai University Electronic Design Automation Education” project to enhance the education of electronic design in Tunghai University. Besides, the authors would like to acknowledge software and cell library support provided by Taiwan Semiconductor Research Institute (TSRI), Taiwan, R.O.C.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Tsai, KL., Leu, FY., Chang, SW., Lin, JY., Luo, HT. (2020). A LoRaWAN Based Energy Efficient Data Encryption Method. In: Barolli, L., Xhafa, F., Hussain, O. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2019. Advances in Intelligent Systems and Computing, vol 994. Springer, Cham. https://doi.org/10.1007/978-3-030-22263-5_47
Download citation
DOI: https://doi.org/10.1007/978-3-030-22263-5_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22262-8
Online ISBN: 978-3-030-22263-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)