Secure Data Transmissions for Iraqi National Identification Card Using LoRaWAN Protocol

Presently, the Internet of Things (IoT) applications hold a considerable effect on the life of people whilst the IoT size has been growing swiftly. A massive amount of data, billions of devices, and various types of modern protocols are capable of bringing different security problems. In addition, the malicious activities have increased with more sophisticated attacks, that will result in higher risks. Therefore, the security aspect is becoming an increasingly important year-after year. LoRaWAN is a protocol for long-range communication with low-power devoted to IoT. This protocol can be utilized for transmitting messages among IoT end devices and gateways. Yet, because the LoRaWAN development remains at an early level, the security level of this protocol is not well developed. Therefore, there is an urgent and necessary requirement for developing and analyzing the security level of LoRaWAN. In order to be benefited from this modern protocol, it is practically implemented in the Ministry of Interior/Civil Status Directorate, Passports and Residence in the Iraqi Governorates/National Identification Card (ID). In each governorate, this section is connected with the subdistricts in the same geographical area for exchanging data as an alternative to the Internet service due to the problems and its interruptions. In this paper, the main objective is to utilize the usefulness of modern technologies and implement it, and connecting to a remote database for the purpose of dealing with the stored data, also, providing an additional layer of security to increase the integrity (reliability) of data sent within this network using elliptic curve cryptography without affecting the efficiency of the network and the speed of data transmissions.

[1]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[2]  Nuno Pereira,et al.  Security Risk Analysis of LoRaWAN and Future Directions , 2018, Future Internet.

[3]  Dirk Fox,et al.  Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.

[4]  Jumana Waleed,et al.  Smart home as a new trend, a simplicity led to revolution , 2018, 2018 1st International Scientific Conference of Engineering Sciences - 3rd Scientific Conference of Engineering Science (ISCES).

[5]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[6]  Moncef Amara,et al.  Elliptic Curve Cryptography and its applications , 2011, International Workshop on Systems, Signal Processing and their Applications, WOSSPA.

[7]  Sandra Sendra,et al.  Integration of LoRaWAN and 4G/5G for the Industrial Internet of Things , 2018, IEEE Communications Magazine.

[8]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[9]  Konstantin Mikhaylov,et al.  Analysis of Capacity and Scalability of the LoRa Low Power Wide Area Network Technology , 2016 .

[10]  Padma Bh,et al.  Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method , 2010 .

[11]  Duncan S. Wong,et al.  Analysis and improvement of an authenticated key exchange protocol for sensor networks , 2005, IEEE Communications Letters.

[12]  Ethiopia Nigussie,et al.  Security of LoRaWAN v1.1 in Backward Compatibility Scenarios , 2018, FNC/MobiSPC.

[13]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[14]  Nibras Raad,et al.  Secure Data In LoRaWAN Network By Adaptive Method Of Elliptic-curve Cryptography , 2019, 2019 International Conference on Computing and Information Science and Technology and Their Applications (ICCISTA).

[15]  Ahcène Bounceur,et al.  A study of LoRa low power and wide area network technology , 2017, 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[16]  Manuel Mazzara,et al.  The Internet of Hackable Things , 2016, SEDA.