Next Article in Journal
Research on Strain Measurements of Core Positions for the Chinese Space Station
Next Article in Special Issue
A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios
Previous Article in Journal
Design and Fabrication of Full Wheatstone-Bridge-Based Angular GMR Sensors
Previous Article in Special Issue
Power Consumption and Calculation Requirement Analysis of AES for WSN IoT
Open AccessArticle

Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach

Department of Information and Communications Engineering, University of Murcia, 30100 Murcia, Spain
European Commission, Joint Research Centre, 21027 Ispra, Italy
Author to whom correspondence should be addressed.
Sensors 2018, 18(6), 1833;
Received: 19 April 2018 / Revised: 31 May 2018 / Accepted: 1 June 2018 / Published: 5 June 2018
(This article belongs to the Special Issue Security, Trust and Privacy for Sensor Networks)
Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN. View Full-Text
Keywords: LoRaWAN; Internet of Things; security; EDHOC; key management LoRaWAN; Internet of Things; security; EDHOC; key management
Show Figures

Figure 1

MDPI and ACS Style

Sanchez-Iborra, R.; Sánchez-Gómez, J.; Pérez, S.; Fernández, P.J.; Santa, J.; Hernández-Ramos, J.L.; Skarmeta, A.F. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach. Sensors 2018, 18, 1833.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop