LoRaWAN Security
DOI:
https://doi.org/10.13052/jicts2245-800X.915Keywords:
LoRaWAN, security, authentication, encryption, Join Server, activation, personalization, provisioningAbstract
The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties supported in LoRaWAN security are mutual end-point authentication, data origin authentication, integrity and replay protection, and confidentiality. The use of symmetric cryptography and prior secret key sharing between a device and a server enables an extremely power efficient and network efficient activation procedure.
Downloads
References
NIST, FIPS 197, “Advanced Encryption Standard (AES)”, November 2001.
Song, J.H., Poovendran, R., Lee, J., and T. Iwata, “The AES-CMAC Algorithm”, RFC 4493, RFC Editor, June 2006.
Dworkin, M., “Recommendation for Block Cipher Modes of Operation: Methods and Techniques”, NIST Special Publication 800-38A, December 2001.
LoRaWAN Link Layer Specification version 1.0.3, LoRa Alliance Technical Committee, July 2018.
LoRaWAN Backend Interfaces Specification version 1.0, LoRa Alliance Technical Committee, October 2017.