Enhancing the security of the IoT LoraWAN architecture

The Internet of things (IoT) is invading our lives by connecting surrounding human things to the Internet. This allows a smarter and comfortable human living space. However, it exposes private and sensitive data as well as human appliances to attackers. Security solutions based on cryptography might solve these problems. However, these solutions need the use of encryption keys that must be managed securely and properly. We investigate, in this paper, existing key management protocols proposed for the Internet of things. Then, we propose a solution to enhance the security of the IoT loraWAN architecture. Our solution is inspired from an existing key management solution that uses proxy nodes to alleviate the computation in the constrained node side. We propose the use of a reputation system for proxy nodes selection which permits a reliable and attacks free security solution.

[1]  Alexis Olivereau,et al.  D-HIP: A distributed key exchange scheme for HIP-based Internet of Things , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[2]  Luca Veltri,et al.  A novel batch-based group key management protocol applied to the Internet of Things , 2013, Ad Hoc Networks.

[3]  Imed Romdhani,et al.  A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[4]  Giuseppe Piro,et al.  Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.

[5]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[6]  XuLi,et al.  The Internet of Things--A survey of topics and trends , 2015 .

[7]  Ramaswamy Chandramouli,et al.  Cryptographic Key Management Issues and Challenges in Cloud Services , 2014, Secure Cloud Computing.

[8]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[9]  N. Renugadevi,et al.  Key management schemes for secure group communication in wireless networks - A survey , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[10]  Kai Zhao,et al.  A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.

[11]  Djamel Tandjaoui,et al.  A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things , 2014, ADHOC-NOW Workshops.

[12]  Yue Li,et al.  Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[13]  Deepak Choudhary,et al.  Internet of things: A survey on enabling technologies, application and standardization , 2018 .

[14]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[15]  Andrei V. Gurtov,et al.  Proxy-based end-to-end key establishment protocol for the Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).