Enhancing Security in Low-power Wide-area (LPWA) IoT Environments: The Role of HSM, Tamper-proof Technology, and Quantum Cryptography
DOI:
https://doi.org/10.13052/jwe1540-9589.2363Keywords:
Web-based LPWA security framework, ruggedized IoT, HSM, tamper-proofAbstract
Low-power wide-area (LPWA) networks are integral to expanding Internet of Things (IoT) applications, offering extensive coverage with low power consumption. However, these networks face significant security challenges due to their widespread deployment and inherent constraints. In order to provide secure services in an LPWA IoT environment, important information stored in IoT devices (encryption keys, device unique numbers, etc.) must be safely protected from external hacking or theft by physical access, and it is necessary to develop tamper-proof technology to enhance physical security. Meanwhile, with so many ruggedized IoT devices processing and transmitting sensitive information, security systems are essential to protect the integrity and privacy of IoT data. This paper explores the critical role of hardware security modules (HSMs), tamper-proof technology, and quantum cryptography in enhancing the physical, network, and data security of LPWA IoT environments. We propose operational strategies for HSMs, tamper-proof technology in ruggedized LPWA IoT settings, and a quantum key distribution (QKD)-based IPsec solution for robust network and data security.
Downloads
References
Stoyanova Maria et al., “A survey on the internet of things (IoT) forensics: challenges approaches and open issues”, IEEE Communications Surveys Tutorials, vol. 22, no. 2, pp. 1191–1221, 2020.
Ammar Mahmoud, Giovanni Russello and Bruno Crispo, “Internet of Things: A survey on the security of IoT frameworks”, Journal of Information Security and Applications, vol. 38, pp. 8–27, 2018.
Hassija Vikas et al., “A survey on IoT security: application areas security threats and solution architectures”, IEEE Access, vol. 7, pp. 82721–82743, 2019.
I. Atov, K. C. Chen, A. Kamal and S. Yu, “Data Science and Artificial Intelligence for Communications”, IEEE Communications Magazine, vol. 58, no. 1, pp. 10–11, 2020.
L Wawrowski, A. Bialas, A. Kajzer, A. Kozlowski, R. Kurianowicz, M. Sikora, et al., “Anomaly detection module for network traffic monitoring in public institutions”, Sensors, vol. 23, no. 6, 2023.
A. Mosenia and N. K. Jha, “A Comprehensive Study of Security of Internet-of-Things”, IEEE Transactions on Emerging Topics in Computing, vol. 5, no. 4, pp. 586–602, Oct. 2017.
P. M. Chanal and M. S. Kakkasageri, “Preserving data confidentiality in Internet of Things”, SN Computer Science, vol. 2, no. 1, pp. 53, 2021.
P. Panahi, C. Bayılmış, U. Çavuşoğlu and S. Kaçar, “Performance evaluation of lightweight encryption algorithms for IoT-based applications”, Arabian Journal for Science and Engineering, vol. 46, pp. 4015–4037, 2021.
A. U. Mentsiev and T. R. Magomaev, “Security threats of NB-IoT and countermeasures”, IOP Conference Series: Materials Science and Engineering, vol. 862, no. 5, pp. 052033, May 2020.
A. A. Laghari, K. Wu, R. A. Laghari, M. Ali and A. A. Khan, “A review and state of art of Internet of Things (IoT)”, Archives of Computational Methods in Engineering, pp. 1–19, 2021.
L. Xiao, X. Wan, X. Lu, Y. Zhang and D. Wu, “IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?”, IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 41–49, Sept. 2018.