Nothing Special   »   [go: up one dir, main page]

Skip to main content

A LoRaWAN Based Energy Efficient Data Encryption Method

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2019)

Abstract

In the past few years, the development of Internet of Things (IoT) has demonstrated a great convenience for human beings’ lives. A well-defined IoT communication protocol assists data transmitted on IoT in a secure and efficient way. The LoRaWAN developed by the LoRa Alliance employs asynchronous communication and three communication modes to control its energy consumption, and utilizes the AES cryptology and two session keys to enhance its communication security. However, the AES encryption process consumes much energy, and the session key also lacks of simple update procedure. To reduce the energy consumed by AES and enhance communication security, in this paper, we design an energy-efficient AES encryption method, named Energy Efficient Data Encryption (E2DE for short) which adopts three low energy design techniques and a simple key update procedure. Simulation is performed by using Synopsys 32 nm cell library with 5 different supply voltages. Experimental results show that average 46.1% energy is reduced when compared to the traditional AES data encryption method. Besides, the session key update procedure can achieve mutual authentication and resist replay and eavesdropping attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tang, B., Chen, Z., Hefferman, G., Pei, S., Wei, T., He, H., Yang, Q.: Incorporating intelligence in fog computing for big data analysis in smart cities. IEEE Trans. Industr. Inf. 13(5), 2140–2150 (2017)

    Article  Google Scholar 

  2. Ahmad, S., Badwelan, A., Ghaleb, A.M., Qamhan, A., Sharaf, M.: Analyzing critical failures in a production process: is industrial IoT the solution? In: Wireless Communications and Mobile Computing, vol. 2018, pp. 1–12, Dec 2018. Article ID 6951318

    Google Scholar 

  3. Yeh, K.H.: A secure IoT-based healthcare system with body sensor networks. IEEE Access 4, 10288–10299 (2016)

    Article  Google Scholar 

  4. [Online]. Available: https://www.lora-alliance.org/

  5. Prasithsangaree, P., Krishnamurthy, P.: Analysis of energy consumption of RC4 and AES algorithms in wireless LANs. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), pp. 1445–1449, Dec 2003

    Google Scholar 

  6. McGrew, D.: Low power wireless scenarios and techniques for saving bandwidth without sacrificing security. In: Proceedings of NIST Lightweight Cryptography Workshop, pp. 1–15, July 2015

    Google Scholar 

  7. Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based Internet of things. Wireless Pers. Commun. 61(3), 527–542 (2011)

    Article  Google Scholar 

  8. Tsai, K.L., Huang, Y.L., Leu, F.Y., You, I., Huang, Y.L., Tsai, C.H.: AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access 6, 45325–45334 (2018)

    Article  Google Scholar 

  9. LoRaWAN Backend Interfaces 1.0 Specification, LoRa Alliance Inc. (2017)

    Google Scholar 

  10. Butun, I., Pereira, N., Gidlund, M.: Security risk analysis of LoRaWAN and future directions. Future Internet 11(1), 1–22 (2019). Article 3

    Google Scholar 

  11. Miller, R.: LoRa security—building a secure LoRa solution. MWR Labs Whitepaper, Mar 2016

    Google Scholar 

  12. You, I., Kwon, S., Choudhary, G., Sharma, V., Seo, J.: An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system. Sensors 18(6), 1–32 (2018). Article 1888

    Article  Google Scholar 

  13. Kim, J., Song, J.: A dual key-based activation scheme for secure LoRaWAN. In: Wireless Communications and Mobile Computing, vol. 2017, pp. 1–12, Nov 2017. Article 6590713

    Google Scholar 

  14. Oniga, B., Dadarlat, V., De Poorter, E., Munteanu, A.: Analysis, design and implementation of secure LoRaWAN sensor network. In: Proceedings of IEEE International Conference on Intelligent Computer Communication and Processing, pp. 421–428, Sept 2017

    Google Scholar 

  15. Dönmez, T.C.M., Nigussie, E.: Security of join procedure and its delegation in LoRaWAN v1.1. In: Proceedings of International Conference on Future Networks and Communications, pp. 204–211 (2018)

    Google Scholar 

  16. Naoui, S., Elhdhili, M.E., Saidane, L.A.: Trusted third party based key management for enhancing LoRaWAN security. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, pp. 1306–1313, Oct 2017

    Google Scholar 

  17. Cheng, Y., Saputra, H., Goh, L.M., Wu, Y.: Secure smart metering based on LoRa technology. In: Proceedings of IEEE International Conference on Identity, Security, and Behavior Analysis, pp. 1–8, Jan 2018

    Google Scholar 

  18. Tsai, K.L., Chang, Y.J., Cheng, Y.C.: Automatic charge balancing content addressable memory with self-control mechanism. IEEE Trans. Circuits Syst. I Regul. Pap. 61(10), 2834–2841 (2014)

    Article  Google Scholar 

Download references

Acknowledgements

The work was supported by the Ministry of Science and Technology, Taiwan, R.O.C. under Grant no. MOST 107-2221-E-029-006. The authors would also like to express thanks to Synopsys Inc. and Dr. Charles Chiang of Synopsys Inc. for donation of “Tunghai University Electronic Design Automation Education” project to enhance the education of electronic design in Tunghai University. Besides, the authors would like to acknowledge software and cell library support provided by Taiwan Semiconductor Research Institute (TSRI), Taiwan, R.O.C.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kun-Lin Tsai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tsai, KL., Leu, FY., Chang, SW., Lin, JY., Luo, HT. (2020). A LoRaWAN Based Energy Efficient Data Encryption Method. In: Barolli, L., Xhafa, F., Hussain, O. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2019. Advances in Intelligent Systems and Computing, vol 994. Springer, Cham. https://doi.org/10.1007/978-3-030-22263-5_47

Download citation

Publish with us

Policies and ethics