Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017, Article ID 6590713, 12 pages
Research Article

A Dual Key-Based Activation Scheme for Secure LoRaWAN

Yonsei University, 3rd Engineering Building C505, 50 Yonsei-ro, Seodaemun-gu, Seoul 03722, Republic of Korea

Correspondence should be addressed to Jaehyu Kim;

Received 28 April 2017; Accepted 12 October 2017; Published 6 November 2017

Academic Editor: Haiyu Huang

Copyright © 2017 Jaehyu Kim and JooSeok Song. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. “Ericsson Mobility Report: On the Pulse of the Networked Society,” 2015.
  2. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: a survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015. View at Publisher · View at Google Scholar · View at Scopus
  3. X. Xiong, K. Zheng, R. Xu, W. Xiang, and P. Chatzimisios, “Low power wide area machine-to-machine networks: Key techniques and prototype,” IEEE Communications Magazine, vol. 53, no. 9, pp. 64–71, 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Centenaro, L. Vangelista, A. Zanella, and M. Zorzi, “Long-range communications in unlicensed bands: The rising stars in the IoT and smart city scenarios,” IEEE Wireless Communications Magazine, vol. 230, no. 5, pp. 60–67, 2016. View at Publisher · View at Google Scholar · View at Scopus
  5. U. Raza, P. Kulkarni, and M. Sooriyabandara, “Low power wide area networks: an overview,” IEEE Communications Surveys & Tutorials, 2017. View at Google Scholar
  6. O. Georgiou and U. Raza, “Low power wide area network analysis: can LoRa scale?” IEEE Wireless Communications Letters, vol. 6, no. 2, pp. 162–165, 2017. View at Publisher · View at Google Scholar
  7. N. Sornin, M. Luis, T. Eirich, T. Kramp, and O. Hersent, “LoRaWAN Specification V1.0.2,” LoRa Alliance, 2016. View at Google Scholar
  8. Z.-K. Zhang, M. C. Y. Cho, and S. Shieh, “Emerging security threats and countermeasures in IoT,” in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15), pp. 1–6, ACM, April 2015. View at Publisher · View at Google Scholar
  9. M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things,” in Proceedings of the IEEE World Congress on Services, SERVICES 2015, pp. 21–28, July 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. K. Zhao and L. Ge, “A survey on the internet of things security,” in Proceedings of the 9th International Conference on Computational Intelligence and Security, CIS 2013, pp. 663–667, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. S.-H. Seo, J. Won, S. Sultana, and E. Bertino, “Effective key management in dynamic wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 371–383, 2015. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Agrawal, R. Roman, ML. Das, A. Mathuria, and J. Lopez, “A novel key update protocol in mobile sensor networks,” in Proceedings of the International Conference on Information Systems Security, pp. 194–207, Springer, 2012.
  13. J. He, X. Zhang, and Q. Wei, “EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2011, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, Recommendation for Key Management Part 1: General (Revision 4), NIST Special Publication, 2016.
  15. P. Girard, “Low Power Widw Area Networks security,” 2015.
  16. R. Miller, “LoRa Security: Building a Secure LoRa Solution,” 2016.
  17. S. Zulian, Security Threat Analysis and Countermeasures for LoRaWAN Join Procedure, 2016,
  18. S. Naoui, M. E. Elhdhili, and L. A. Saidane, “Enhancing the security of the IoT LoraWAN architecture,” in Proceedings of the 5th IFIP International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, PEMWN 2016, November 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. “LoRaWAN - What is it: A technical overview of LoRa and LoRaWAN,” 2015.
  20. LoRa Alliance Technical committee, LoRaWAN Regional Parameters, 2016.
  21. Semtech, LoRaWAN endpoint stack implementation and example projects, 2013.
  22. SK-iM880B –Long Range Radio Starter Kit
  23. iC880A - LoRaWAN Concentrator 868MHz
  24. Semtech, Use with Raspberry Pi, 2016.
  25. The Things Network, From zero to LoRaWAN in a weekend, 2016.
  26. Semtech, LoRa Gateway project
  27. Semtech, Lora network packet forwarder project
  28. Brocaar, LoRa Gateway Bridge
  29. Brocaar, LoRa Server
  30. Brocaar, LoRa App Server
  31. Semtech, LoRa Calculator