2019 2nd International Conference on Communication Engineering and Technology (ICCET) 2019
DOI: 10.1109/iccet.2019.8726884
|View full text |Cite
|
Sign up to set email alerts
|

Potential Development of AES 128-bit Key Generation for LoRaWAN Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…In term of security, a lightweight security program was configured to secure the IoT end device entity and encrypt the data. The design of lightweight IoT security was based on the work of the authors of the reference [31]. IoT end devices must not be duplicated and must be secure from any types of attack.…”
Section: A Iot Infrastructure Design For Community-based Covid-19mentioning
confidence: 99%
“…In term of security, a lightweight security program was configured to secure the IoT end device entity and encrypt the data. The design of lightweight IoT security was based on the work of the authors of the reference [31]. IoT end devices must not be duplicated and must be secure from any types of attack.…”
Section: A Iot Infrastructure Design For Community-based Covid-19mentioning
confidence: 99%
“…Sanchez-Iborra et al [21] evaluated the security vulnerabilities of LoRaWAN in the area of key management and proposed a lightweight key management method on Ephemeral Diffie-Hellman Over COSE transaction. To enhance the security of AES key generation process, Hayati et al [22] investigated several parameters, e.g., key generation time, randomness level, and key length, and claimed that these parameters should be considered in the key generation process. Kim and Song [23] pointed out some security loopholes in LoRaWAN's key update and session key generation and proposed a dual key-based activation scheme with a new network key for LoRaWAN.…”
Section: Related Studiesmentioning
confidence: 99%
“…Considering the relevant QoS, the innovation theme is concerned with technical aspects of data confidentiality and end-to-end security, particularly about key generation along with the parameters required for the 5G-IoT technology [45]. The specialized technical feature of relevant innovation themes includes 5G wireless security architecture based on identity management and flexible authentication, as proposed by [44].…”
Section: ) 5g Innovation Should Provide Improve the Users' Confidencmentioning
confidence: 99%