2021
DOI: 10.3390/s21175838
|View full text |Cite
|
Sign up to set email alerts
|

A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks

Abstract: Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption. The Long Range Wide Area Network (LoRaWAN) is a low power communication protocol that supports message authentication, integrity, and encryption using two-session preshared secret keys. However, although the LoRaWAN supports some security functions, it suffers from session key generation and key update problems. This motivates us t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…Sends less additional information along with the main message. [18] Solving the session key generation and update problems of the Long Range Wide Area Network.…”
Section: Lorawanmentioning
confidence: 99%
See 1 more Smart Citation
“…Sends less additional information along with the main message. [18] Solving the session key generation and update problems of the Long Range Wide Area Network.…”
Section: Lorawanmentioning
confidence: 99%
“…Repetitive patterns like headers, control sequences, pilot sequences, and tail sequences that are recalculated on the receiver to get the real key are examples of the other kind of synchronization that uses unique information [17]. In [18], the authors proposed a one-way hash function to generate hash chains for the LPWANs. To enable the use of a distinct signing key for each message, network entities share a common hash chain consisting of n key components.…”
Section: Related Workmentioning
confidence: 99%
“…The complex CAV security problems may be classified in three areas: at the vehicle level, the supplier chain, and data collection. First, attacks at the vehicle level may occur via the capture of car sensors, physical controls, and V2X communications [158][159][160]. Second, the autonomous nature without human participation will lead to physical hijacking.…”
Section: Connected Autonomous Vehiclesmentioning
confidence: 99%
“…Researchers have conducted studies to address the LoRaWAN key management issue [17], [33]. To improve security key management, researchers have proposed a method of updating the key, as the fundamental problem of LoRaWAN's key management is that the key has a constant value for a long time.…”
Section: B Related Workmentioning
confidence: 99%