How does LoRa ensure IoT security?

Publisher:EEWorld资讯Latest update time:2021-03-01 Source: EEWORLDKeywords:LoRa Reading articles on mobile phones Scan QR code
Read articles on your mobile phone anytime, anywhere

Ensuring functional safety and information security for Internet of Things (IoT) deployments is not just a matter of choosing the right protocols; it also relies on implementation processes as well as best practices and industry standards.


LoRaWAN is designed to be very secure - authentication and encryption are mandatory, however, if security keys are not kept secure and randomly distributed between devices, or if a once-used passphrase (random number) is reused, the network and devices can be compromised. Therefore, it is critical to look for a LoRaWAN CertifiedCM device to ensure that the device has been tested to security standards and works properly.


The LoRa Alliance has always kept security at the forefront of the development of the LoRaWAN specification and is highly transparent about the security features of the protocol (see Figure 1). The LoRaWAN specification was designed from the outset with security as a fundamental aspect, providing state-of-the-art security to meet the needs of highly scalable, low-power IoT networks. Unlike many other IoT technologies, the LoRaWAN specification already provides dedicated end-to-end encryption for application providers.


image.png

Figure 1: LoRaWAN security overview


The specification defines two encryption layers:


Uses a unique 128-bit key shared between the end device and the network server

Uses a unique 128-bit key (AppSKey) shared end-to-end at the application level


The AES algorithm is used to provide authentication and integrity of data packets to the network server and end-to-end encryption to the application server. By providing these two levels, a "multi-tenant" shared network can be achieved without the network operator having to see the user's payload data. The devices can be activated through personalization on the production line or during commissioning, or through over-the-air activation (OTAA) in the field. OTAA allows the key of the device session to be re-set when necessary.


LoRaWAN has all the basic building blocks required and used by any modern wireless communication technology and features AES-128. The inherent security of LoRaWAN provided in the specification needs to be accompanied by the secure implementation and secure deployment of these devices and/or networks to maintain the built-in security mechanisms of the protocol. It should be noted that this is true for all secure device implementations using any communication technology.


As mentioned above, LoRaWAN relies on symmetric cryptography, which requires keys to be shared in a secure and reliable manner. To further aid this process, LoRa Alliance members have developed:


The LoRaWAN backend interface isolates the storage of the root key in the joining server so that it becomes trusted regardless of the network

Secure element solutions that provide additional hardware physical protection to prevent tampering.


To ensure device and network security, as with any technology, best practices are always to use certified equipment and work with proven, trusted service providers. LoRaWAN is no different, and end users can have confidence in their deployment if they leverage resources that know how to properly implement a LoRaWAN solution.


Security is a moving target, malicious actors continue to emerge, and LoRaWAN is constantly evolving to address any new threats. While LoRaWAN is inherently secure, the LoRa Alliance is continually reviewing, designing, and implementing security enhancements and best practices to ensure LoRaWAN stays ahead of the changing security landscape.


Therefore, to help the market choose the right implementation, the LoRa Alliance will release a "Recommended Practices" document next month, which will provide device manufacturers with best practices to ensure the security of their devices. In addition, the Security Working Group reports to the LoRa Alliance Technical Committee responsible for the LoRaWAN specification and continuously reviews the security of technical specifications and documents. The Security Working Group is composed of security experts from LoRa Alliance members and works with academia to review documents and discuss security challenges.


Keywords:LoRa Reference address:How does LoRa ensure IoT security?

Previous article:Sony Israel launches highly integrated NB2 chipset
Next article:Intel Thunderbolt technology celebrates its 10th anniversary, making connectivity easier

Recommended ReadingLatest update time:2024-11-16 12:55

Capgemini promotes the transformation and upgrading of smart buildings by using LoRa technology
As a leading global technology services provider with approximately 400 buildings in use around the world, Capgemini knew the only way to ensure maximum employee productivity in its many offices while meeting its stringent corporate sustainability goals was to implement a smart building system based on proven Internet
[Internet of Things]
Capgemini promotes the transformation and upgrading of smart buildings by using LoRa technology
AI and machine learning algorithms can prevent water leaks and save costs
Semtech Corporation, a leading supplier of high-performance analog and mixed-signal semiconductor products and advanced algorithms, announced that iioote, a Sweden-based independent system integrator providing Internet of Things (IoT) solutions and services, is introducing new features to its WebIoT platform and initi
[Internet of Things]
AI and machine learning algorithms can prevent water leaks and save costs
OPPO's communication solution based on LoRa communication technology without network conditions
As wireless headphones and wearable devices are becoming more popular among consumers, various communication technologies have also been developed. For example, in terms of long-distance communication, LoRa technology has emerged, which is a low-power local area network wireless standard established by Semtech. Its bi
[Mobile phone portable]
OPPO's communication solution based on LoRa communication technology without network conditions
Latest Internet of Things Articles
Change More Related Popular Components

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号