Research on LoRa network security schemes based on RF fingerprint

Long range radio (LoRa) is widely used in the IoT due to its advantages of long distance and low power consumption.However, LoRa network has no reliable security scheme currently, making it unable to guarantee the communication security.Therefore, based on the uniqueness and tamper-resistance of rad...

Full description

Saved in:
Bibliographic Details
Main Authors: Yu JIANG, Siqing CHEN, Wen SUN
Format: Article
Language:zho
Published: China InfoCom Media Group 2021-12-01
Series:物联网学报
Subjects:
Online Access:http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2021.00228/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841531129563185152
author Yu JIANG
Siqing CHEN
Wen SUN
author_facet Yu JIANG
Siqing CHEN
Wen SUN
author_sort Yu JIANG
collection DOAJ
description Long range radio (LoRa) is widely used in the IoT due to its advantages of long distance and low power consumption.However, LoRa network has no reliable security scheme currently, making it unable to guarantee the communication security.Therefore, based on the uniqueness and tamper-resistance of radio frequency fingerprint, it was proposed to receive radio frequency signals of the LoRa end nodes which requested access, extract the fingerprints from them, mark it and match with the customized multi-scale security rules according to demands to decide whether the identities of the LoRa end nodes were safe, taking security measures accordingly.Based on this, original LoRa gateway and LoRa network architecture were improved, new workflows were designed, and two LoRa network security schemes were proposed.The two LoRa network security schemes were proposed which implement identity authentication and access control of the LoRa end nodes from the physical layer.It is only needed to improve the original LoRa gateway in the LoRa network architecture and its workflow, which adds new security measures and guarantees for LoRa applications on the basis of not affecting the original LoRaWAN security mechanism, with no need to modify a huge number of LoRa end nodes.The security schemes proposed have high practical value.
format Article
id doaj-art-04b3fd45d6334bff845f6f129483557b
institution Kabale University
issn 2096-3750
language zho
publishDate 2021-12-01
publisher China InfoCom Media Group
record_format Article
series 物联网学报
spelling doaj-art-04b3fd45d6334bff845f6f129483557b2025-01-15T02:53:08ZzhoChina InfoCom Media Group物联网学报2096-37502021-12-015172559647553Research on LoRa network security schemes based on RF fingerprintYu JIANGSiqing CHENWen SUNLong range radio (LoRa) is widely used in the IoT due to its advantages of long distance and low power consumption.However, LoRa network has no reliable security scheme currently, making it unable to guarantee the communication security.Therefore, based on the uniqueness and tamper-resistance of radio frequency fingerprint, it was proposed to receive radio frequency signals of the LoRa end nodes which requested access, extract the fingerprints from them, mark it and match with the customized multi-scale security rules according to demands to decide whether the identities of the LoRa end nodes were safe, taking security measures accordingly.Based on this, original LoRa gateway and LoRa network architecture were improved, new workflows were designed, and two LoRa network security schemes were proposed.The two LoRa network security schemes were proposed which implement identity authentication and access control of the LoRa end nodes from the physical layer.It is only needed to improve the original LoRa gateway in the LoRa network architecture and its workflow, which adds new security measures and guarantees for LoRa applications on the basis of not affecting the original LoRaWAN security mechanism, with no need to modify a huge number of LoRa end nodes.The security schemes proposed have high practical value.http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2021.00228/RF fingerprintphysical layer securityaccess controlLoRa gatewayLoRa network security
spellingShingle Yu JIANG
Siqing CHEN
Wen SUN
Research on LoRa network security schemes based on RF fingerprint
物联网学报
RF fingerprint
physical layer security
access control
LoRa gateway
LoRa network security
title Research on LoRa network security schemes based on RF fingerprint
title_full Research on LoRa network security schemes based on RF fingerprint
title_fullStr Research on LoRa network security schemes based on RF fingerprint
title_full_unstemmed Research on LoRa network security schemes based on RF fingerprint
title_short Research on LoRa network security schemes based on RF fingerprint
title_sort research on lora network security schemes based on rf fingerprint
topic RF fingerprint
physical layer security
access control
LoRa gateway
LoRa network security
url http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2021.00228/
work_keys_str_mv AT yujiang researchonloranetworksecurityschemesbasedonrffingerprint
AT siqingchen researchonloranetworksecurityschemesbasedonrffingerprint
AT wensun researchonloranetworksecurityschemesbasedonrffingerprint