2018
DOI: 10.1007/978-3-319-94147-9_8
|View full text |Cite
|
Sign up to set email alerts
|

Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks

Abstract: Recent technologies for low-rate, long-range transmission in unlicensed sub-GHz frequency bands enables the realization of Long-range Wide Area Network. Despite the rapid uptake of LPWANs, security concerns arising from the open architecture and usage of the unlicensed band are also growing. While the current LPWAN deployments include basic techniques to deal with end-to-end encryption there are specific security issues that arise due to the overall architecture and protocol layer design. In this paper, a new … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…Important future work is to examine the levels of cyber-security and cyber-protection achieved. As a system composed of different smart devices, with data processing carried out at remotely located micro-data centres, guaranteeing the overall security of the system is a challenge [62,103,104]. Towards this direction, we need to develop efficient methods and technologies to benchmark the smart water micro-components' protection efficiency.…”
Section: Discussionmentioning
confidence: 99%
“…Important future work is to examine the levels of cyber-security and cyber-protection achieved. As a system composed of different smart devices, with data processing carried out at remotely located micro-data centres, guaranteeing the overall security of the system is a challenge [62,103,104]. Towards this direction, we need to develop efficient methods and technologies to benchmark the smart water micro-components' protection efficiency.…”
Section: Discussionmentioning
confidence: 99%
“…The technology is specifically designed for long range communications (up to 50 km depending on the LPWAN device) [ 32 , 33 , 34 , 35 ]. LPWAN technologies are distinguished from other connectivity technologies as they have outstanding features which include low power consumption, low cost, bit rate, capacity and mobility [ 20 ]. Furthermore, they provide battery-efficient possibility targeting 10+ battery life, universal wide-area connectivity thereby allowing numerous M2M and IoT applications unlike popular short-range network devices such as Bluetooth, Wi-Fi, and ZigBee [ 36 ].…”
Section: Overview Of Lpwanmentioning
confidence: 99%
“…The security protocol was developed to support mutual authentication, secret key exchange, perfect forward secrecy, and end-to-end security between node devices. Similarly, to establish a secured end to end LPWAN communication, the authors in [ 20 ] proposed a replay attack mitigation scheme involving two different AES keys. The authors used a frame counter which involves two different 128-bit AES session keys for upstream and downstream messages exchange, respectively, for the blockage of repeated transmission of packets.…”
Section: Lpwan Security Analysismentioning
confidence: 99%
See 2 more Smart Citations