Font Size: a A A

Design And Simulation Of LoRaWAN Protocol For End-to-End Security

Posted on:2022-10-31Degree:MasterType:Thesis
Country:ChinaCandidate:J LiFull Text:PDF
GTID:2518306605969809Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Low-power wide area network technology occupies an important position in Io T communications due to its wide coverage and very low power consumption.Long Range(LoRa)technology,as a low-power wide area network technology,improves signal receiving sensitivity and communication coverage through Spread Spectrum Communication.LoRa technology is widely used in many fields such as logistics tracking,smart cities,smart agriculture,and automated manufacturing.LoRa WAN is a network communication protocol and system architecture based on LoRa technology formulated by the LoRa Alliance.The communication between the LoRa terminal and the gateway is in an open environment and is vulnerable to attacks by malicious third parties.The LoRa terminal and the application server establish the application session key with the help of the network server.The end-to-end security between the LoRa terminal and the application server is threatened.At the same time,LoRa terminals are also limited by cost and power consumption.Therefore,it is essential to design a low-cost end-to-end secure LoRa terminal access protocol.In addition,as more and more LoRa terminals are connected to the network,network resources are difficult to meet the communication needs,and direct communication between LoRa terminals is required to prevent security threats and privacy threats in the key negotiation process between LoRa terminals,The design of an end-to-end secure key agreement protocol between LoRa terminals is very important.This article first proposes a LoRa terminal secure access protocol based on ECQV.The protocol uses the ECQV algorithm to generate a shared key between the LoRa terminal and the application server through an implicit certificate,which is kept secret from any third party,and realizes the end-to-end security between the LoRa terminal and the application server.Use sequence numbers and pseudo-random numbers to prevent replay attacks.Prevent desynchronization attacks by storing old and new serial numbers and random numbers.The protocol not only has end-to-end security,but also resists common attacks such as replay,counterfeiting,desynchronization,and resource exhaustion,and provides forward security.Secondly,this thesis proposes a key agreement protocol between LoRa terminals.The protocol defaults that the relevant LoRa terminal has been connected to the network through the access protocol.Two-way authentication and data encryption are carried out between the LoRa terminal and the network server through the shared network session key,and the other party's key is obtained safely in an open environment through the exclusive OR operation.Afterwards,the ECQV algorithm is used to generate a shared key between LoRa terminals through an implicit certificate,and the session messages are all encrypted with the recipient's key during key negotiation.This protocol can ensure end-to-end security between LoRa terminals,and can resist common attacks such as replay,counterfeiting,desynchronization,and resource exhaustion,and provide forward security.Based on the BAN logic,the above two protocols are formally analyzed,and the analysis results show that both protocols are safe.Then compare the protocol in this article with the existing similar protocols,and the protocol in this article has higher security.In the above two protocols,the Hash function used by the LoRa terminal is the EHBL function.This thesis conducts behavior-level simulation and hardware resource analysis on it.The simulation results show that this function requires less hardware resources and can be embedded in LoRa terminals to meet the needs of low-cost LoRa terminals.
Keywords/Search Tags:LoRaWAN, end-to-end security, access protocol, key agreement, ECQV, Hash
PDF Full Text Request
Related items