Next Article in Journal
Forward-Secure Linkable Ring Signatures from Bilinear Maps
Next Article in Special Issue
Redundancy in Key Management for WSNs
Previous Article in Journal
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption
Article Menu

Export Article

Open AccessArticle
Cryptography 2018, 2(4), 34;

An Enhanced Key Management Scheme for LoRaWAN

School of Engineering, RMIT University, Melbourne 3000, Australia
Author to whom correspondence should be addressed.
Received: 21 August 2018 / Revised: 23 October 2018 / Accepted: 29 October 2018 / Published: 2 November 2018
(This article belongs to the Special Issue Key Management in Wireless Sensor Network)
Full-Text   |   PDF [2596 KB, uploaded 2 November 2018]   |  


The LoRaWAN is one of the new low-power wide-area network (LPWAN) standards applied to Internet of Things (IoT) technology. The key features of LPWAN are its low power consumption and long-range coverage. The LoRaWAN 1.1 specification includes a basic security scheme. However, this scheme could be further improved in the aspect of key management. In this paper, LoRaWAN 1.1 security is reviewed, and enhanced LoRaWAN security with a root key update scheme is proposed. The root key update will make cryptoanalysis of security keys in LoRaWAN more difficult. The analysis and simulation show that the proposed root key update scheme requires fewer computing resources compared with other key derivation schemes, including the scheme used in the LoRaWAN session key update. The results also show the key generated in the proposed scheme has a high degree of randomness, which is a basic requirement for a security key. View Full-Text
Keywords: LoRaWAN security; Internet of Things; key management LoRaWAN security; Internet of Things; key management

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Han, J.; Wang, J. An Enhanced Key Management Scheme for LoRaWAN. Cryptography 2018, 2, 34.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics



[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top