Title
Trusted Third Party Based Key Management For Enhancing Lorawan Security
Abstract
The Internet of things (IoT) is pervading our lives to allow a comfortable and smarter human living space by connecting surrounding human things to the Internet. But, it reveals sensitive and private data as well as human appliances to intruders. To solve these problems, security solutions based on cryptography might be used. But, these solutions are based on encryption keys that must be managed securely and properly while taking into account the IoT characteristics. In this paper, we investigate the LoRaWAN IoT architecture. We evaluate its security by gathering possible attacks that can be launched on it, using the Scyther tool. Then, we propose an enhanced version of the LoRaWAN architecture that solves those attacks. We evaluate the proposed solution in terms of security and key management requirements and compare it to existing solutions.
Year
DOI
Venue
2017
10.1109/AICCSA.2017.73
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA)
Field
DocType
ISSN
Key management,Trusted third party,Architecture,Cryptography,Computer science,Server,Internet of Things,Computer network,Encryption,The Internet
Conference
2161-5322
Citations 
PageRank 
References 
0
0.34
0
Authors
3
Name
Order
Citations
PageRank
Sarra Naoui111.71
Mohamed Elhoucine Elhdhili2266.25
Leïla Azouz Saïdane314137.35