2019 IEEE 19th International Conference on Communication Technology (ICCT) 2019
DOI: 10.1109/icct46805.2019.8947215
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Secure Key Management Scheme for LoRa System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…A lightweight key exchange protocol based on Ephemeral Diffie-Hellman Over COSE (EDHOC), where COSE stands for Concise binary object representation Object Signing and Encryption. Xing et al [10] Lack of root key update.…”
Section: Yearmentioning
confidence: 99%
See 1 more Smart Citation
“…A lightweight key exchange protocol based on Ephemeral Diffie-Hellman Over COSE (EDHOC), where COSE stands for Concise binary object representation Object Signing and Encryption. Xing et al [10] Lack of root key update.…”
Section: Yearmentioning
confidence: 99%
“…So, the need for updating the static root keys are reduced. Also, unlike [7,9,10], they used Public Key Cryptography (PKC) for the key exchanges, according to [41,42] the PKC requires more computation resources than symmetrical cryptography, and our session key generation uses the symmetrical method that can be done on both sides independently. Hence, we have less computational requirement compared to the PKC method, which is a highly important factor for the LoRaWAN constrained end devices because most end devices are battery powered.…”
Section: Analysis Of Solutionsmentioning
confidence: 99%
“…A key management and update mechanism is proposed in [65] for LoRa devices. Elliptic-curve Deffie-Helman (ECC-DH) is used for key agreements, and a hierarchical deterministic (HD) wallet is used for key management in the system.…”
Section: Security Vulnerabilities In Lpwanmentioning
confidence: 99%
“…The process requires end nodes to perform several calculations, it most probably will have an adverse effect on the node lifetime An Improved Secure Key Management Scheme for LoRa System [65] A key management and update mechanism based on ECC for LoRa devices.…”
Section: Experimental Investigation On Wireless Key Generation For Low-power Wide-area Network [63]mentioning
confidence: 99%
“…Therefore, poor implementation also may put end-devices and gateways in danger. A series of articles on key management for LoRa based networks 5,6 was published later advocating for key-management solutions. There was also proposed a way to secure communication for healthcare monitoring system.…”
Section: Introductionmentioning
confidence: 99%