Securing the LoRaWAN join procedure using blockchains

  • PDF / 2,024,123 Bytes
  • 16 Pages / 595.276 x 790.866 pts Page_size
  • 81 Downloads / 235 Views

DOWNLOAD

REPORT


(0123456789().,-volV)(0123456789(). ,- volV)

Securing the LoRaWAN join procedure using blockchains Syed Muhammad Danish1 • Marios Lestas2 • Hassaan Khaliq Qureshi3 • Kaiwen Zhang1 • Waqar Asif4 Muttukrishnan Rajarajan4



Received: 30 August 2019 / Revised: 22 January 2020 / Accepted: 28 January 2020 Ó Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract LoRaWAN, part of the long range Internet of Things (IoT) technologies, is a Low Power Wide Area (LPWA) protocol that enables communication between the battery operated resource constrained devices. Although LoRaWAN provides systemlevel security, these networks are based on a basic assumption of trust between the network server and the user, which as a result empowers a network server with undue authorities. Moreover, the nature of the LoRaWAN join procedure, which is a key component for ensuring network operation, is highly susceptible to jamming and replay attacks through slight packet manipulation, thus making the network vulnerable. In order to address these deficiencies, we present a blockchain-based distributed framework for the LoRaWAN join procedure, in order to provide a secure and trusted authentication system within LoRaWAN networks. Our proposed solution eliminates the jamming and replay attack threats against the LoRaWAN join procedure and in addition builds trust among LoRa end devices and network servers. The framework is endorsed by a Proof of Concept (PoC) implementation using the Ethereum blockchain which is used to evaluate the proposed system in realistic LoRaWAN network scenarios. The simulations results indicate that the proposed solution achieves efficient system performance up to an upper bound on the load level which involves 30 join requests from 1000 concurrent clients. Keywords Blockchain  LoRaWAN network  Join procedure  IoT security  Authentication

1 Introduction

& Syed Muhammad Danish [email protected] Marios Lestas [email protected] Hassaan Khaliq Qureshi [email protected] Kaiwen Zhang [email protected] Waqar Asif [email protected] Muttukrishnan Rajarajan [email protected] 1

Ecole de Technologie Superieure (ETS), Montreal, Canada

2

Frederick University, Limassol, Cyprus

3

National University of Sciences & Technology (NUST), Islamabad, Pakistan

4

City, University of London, London, UK

According to Ericsson’s mobility report [1], there will be 18 billion Internet of Things (IoT) devices by 2022 and to anticipate for this prospect, market spending for IoT related services is constantly rising. Presently, IoTs are experiencing major deployments both in consumer applications as well as in industry. With the increasing number of IoT devices, security and privacy of user’s data have become a key concern [2, 3]. There is a need to introduce new mechanisms to fulfil the IoT security requirement but, due to the lack of available computational resources, these devices cannot make use of the traditional security mechanisms [3]. IoT devices are often powe