| With the development of science and technology,the era of the Internet of Everything is gradually coming.Among many Io T protocols,LoRaWAN has gradually become popular due to its wide communication distance,stable transmission speed,and lower energy consumption.However,with the development and application of the protocol,some potential security risks and threats have also been exposed,so the research on its security is of great significance.Therefore,this article analyzes and studies the key management issues in the LoRaWAN network,and proposes a variety of solutions to improve the security of LoRaWAN.In view of the fixed root key in the LoRaWAN network,this paper proposes a key update protocol.The protocol is based on the elliptic curve Diffile-Hellman protocol,which has the characteristics of high security and low energy consumption.In addition,by adding mechanisms such as random numbers,signatures and message verification codes,the protocol ensures the integrity and security of the communication process and can resist multiple attacks.Subsequently,in view of the traditional LoRaWAN architecture,this paper proposes a new LoRaWAN architecture based on the blockchain.This architecture realizes the distributed storage of keys by using the decentralized and distributed characteristics of the blockchain.Utilizing the non-tamperable feature of the blockchain,the security of the key is guaranteed.In addition,through distributed storage of keys,this solution changes the way OTAA,shortens the time of OTAA,and improves the efficiency of OTAA.In order to verify the feasibility of the architecture,this article uses open source tools to build a workable prototype,which proves its usability from a practical point of view.At a deeper level,this article innovatively combines edge computing and blockchain,allowing some data processing to be placed on the edge nodes,which greatly reduces the burden on the central network,and without delaying the original functions,greatly improve the efficiency of work.Formal verification and simulation experiments show that the protocol and architecture proposed in this paper can resist common wireless network attacks,and show better performance in terms of node access to the network and secure storage of keys.The key update protocol and the new blockchain-based architecture proposed in this paper fully consider the characteristics of the LoRaWAN network,and provide a solution with both security and practicality,which provides a good reference value for the development and research of the LoRaWAN network. |