dc.contributor.author |
Mtetwa, NS
|
|
dc.contributor.author |
Tarwireyi, P
|
|
dc.contributor.author |
Sibeko, CN
|
|
dc.contributor.author |
Abu-Mahfouz, Adnan MI
|
|
dc.contributor.author |
Adigun, M
|
|
dc.date.accessioned |
2022-05-27T09:08:07Z |
|
dc.date.available |
2022-05-27T09:08:07Z |
|
dc.date.issued |
2022-01 |
|
dc.identifier.citation |
Mtetwa, N., Tarwireyi, P., Sibeko, C., Abu-Mahfouz, A.M. & Adigun, M. 2022. Blockchain-based security model for LoRaWAN firmware updates. <i>Journal of Sensor and Actuator Networks, 11(1).</i> http://hdl.handle.net/10204/12428 |
en_ZA |
dc.identifier.issn |
2224-2708 |
|
dc.identifier.uri |
https://doi.org/10.3390/jsan11010005
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/12428
|
|
dc.description.abstract |
The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices. |
en_US |
dc.format |
Fulltext |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.uri |
https://www.mdpi.com/2224-2708/11/1/5 |
en_US |
dc.source |
Journal of Sensor and Actuator Networks, 11(1) |
en_US |
dc.subject |
Internet of Things |
en_US |
dc.subject |
IoT |
en_US |
dc.subject |
Blockchain |
en_US |
dc.subject |
InterPlanentary File System |
en_US |
dc.subject |
Long-Range Wide Area Network |
en_US |
dc.subject |
LoRaWAN |
en_US |
dc.subject |
Firmware |
en_US |
dc.title |
Blockchain-based security model for LoRaWAN firmware updates |
en_US |
dc.type |
Article |
en_US |
dc.description.pages |
39 |
en_US |
dc.description.note |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
en_US |
dc.description.cluster |
Next Generation Enterprises & Institutions |
en_US |
dc.description.impactarea |
EDT4IR Management |
en_US |
dc.identifier.apacitation |
Mtetwa, N., Tarwireyi, P., Sibeko, C., Abu-Mahfouz, A. M., & Adigun, M. (2022). Blockchain-based security model for LoRaWAN firmware updates. <i>Journal of Sensor and Actuator Networks, 11(1)</i>, http://hdl.handle.net/10204/12428 |
en_ZA |
dc.identifier.chicagocitation |
Mtetwa, NS, P Tarwireyi, CN Sibeko, Adnan MI Abu-Mahfouz, and M Adigun "Blockchain-based security model for LoRaWAN firmware updates." <i>Journal of Sensor and Actuator Networks, 11(1)</i> (2022) http://hdl.handle.net/10204/12428 |
en_ZA |
dc.identifier.vancouvercitation |
Mtetwa N, Tarwireyi P, Sibeko C, Abu-Mahfouz AM, Adigun M. Blockchain-based security model for LoRaWAN firmware updates. Journal of Sensor and Actuator Networks, 11(1). 2022; http://hdl.handle.net/10204/12428. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Mtetwa, NS
AU - Tarwireyi, P
AU - Sibeko, CN
AU - Abu-Mahfouz, Adnan MI
AU - Adigun, M
AB - The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices.
DA - 2022-01
DB - ResearchSpace
DP - CSIR
J1 - Journal of Sensor and Actuator Networks, 11(1)
KW - Internet of Things
KW - IoT
KW - Blockchain
KW - InterPlanentary File System
KW - Long-Range Wide Area Network
KW - LoRaWAN
KW - Firmware
LK - https://researchspace.csir.co.za
PY - 2022
SM - 2224-2708
T1 - Blockchain-based security model for LoRaWAN firmware updates
TI - Blockchain-based security model for LoRaWAN firmware updates
UR - http://hdl.handle.net/10204/12428
ER -
|
en_ZA |
dc.identifier.worklist |
25688 |
en_US |